Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll

Overview

General Information

Sample name:SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll
Analysis ID:1431433
MD5:6528055bc2fa49ae0cd65d2ffbbffc2f
SHA1:d61bd08ebe3cadc025c2855408df2ea5cf333079
SHA256:d52c8e88917ca1759d156deaeb46a64e1102a59c3617bba32f652a60afe75cf5
Tags:dll
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
Renames NTDLL to bypass HIPS
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Enables driver privileges
Enables security privileges
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Installs a raw input device (often for capturing keystrokes)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file does not import any functions
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7152 cmdline: loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 3596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5668 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 5884 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • WerFault.exe (PID: 2416 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5884 -s 808 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 5544 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll, DLL MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 520 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5544 -s 800 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 7280 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll", DLL MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 7336 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7280 -s 872 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllAvira: detected
Source: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllVirustotal: Detection: 48%Perma Link
Source: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllJoe Sandbox ML: detected
Source: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
Source: Binary string: wgdi32.pdbUGP source: loaddll32.exe, 00000002.00000003.1345228328.00000000012C7000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000002.00000003.1347663473.00000000012C7000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000002.00000003.1339182709.00000000012B2000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000002.00000003.1342158891.00000000012C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1315072879.0000000002F0F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1321885815.0000000002EFD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.1681788063.0000000002EF9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1316161195.0000000002EFE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1321297230.0000000002EFD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1314214773.0000000002EFE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1315166483.0000000002EFE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1319791841.0000000002EFD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1307539655.0000000002EFF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1314012323.0000000002EA0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1310055446.0000000002E9B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1307060024.0000000002E88000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1317480969.0000000002EA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1352799164.0000000003410000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1355201068.0000000003422000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1359058753.0000000003422000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1349835454.0000000003410000.00000004.00000020.00020000.00000000.sdmp, 6e90c1.tmp.7.dr, 6ea089.tmp.2.dr, 6ea2a6.tmp.14.dr, 6ea3c3.tmp.14.dr, 6e93e4.tmp.6.dr, 6e91ce.tmp.7.dr, 6e9386.tmp.7.dr, 6ea4ee.tmp.14.dr
Source: Binary string: wntdll.pdbUGP source: 6e93e5.tmp.7.dr, 6ea1f8.tmp.14.dr, 6e9c29.tmp.2.dr, 6e924c.tmp.7.dr, 6e90f1.tmp.7.dr, 6ea2d6.tmp.14.dr, 6e8fa6.tmp.7.dr, 6e9ecf.tmp.2.dr
Source: Binary string: wntdll.pdb source: 6e93e5.tmp.7.dr, 6ea1f8.tmp.14.dr, 6e9c29.tmp.2.dr, 6e924c.tmp.7.dr, 6e90f1.tmp.7.dr, 6ea2d6.tmp.14.dr, 6e8fa6.tmp.7.dr, 6e9ecf.tmp.2.dr
Source: Binary string: wuser32.pdb source: 6ea267.tmp.14.dr, 6ea451.tmp.14.dr, 6ea335.tmp.14.dr, 6ea15a.tmp.14.dr, 6e91bd.tmp.6.dr, 6e95ab.tmp.6.dr, 6e9385.tmp.6.dr
Source: Binary string: wgdi32.pdb source: loaddll32.exe, 00000002.00000003.1345228328.00000000012C7000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000002.00000003.1347663473.00000000012C7000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000002.00000003.1339182709.00000000012B2000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000002.00000003.1342158891.00000000012C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1315072879.0000000002F0F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1321885815.0000000002EFD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.1681788063.0000000002EF9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1316161195.0000000002EFE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1321297230.0000000002EFD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1314214773.0000000002EFE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1315166483.0000000002EFE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1319791841.0000000002EFD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1307539655.0000000002EFF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1314012323.0000000002EA0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1310055446.0000000002E9B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1307060024.0000000002E88000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1317480969.0000000002EA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1352799164.0000000003410000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1355201068.0000000003422000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1359058753.0000000003422000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1349835454.0000000003410000.00000004.00000020.00020000.00000000.sdmp, 6e90c1.tmp.7.dr, 6ea089.tmp.2.dr, 6ea2a6.tmp.14.dr, 6ea3c3.tmp.14.dr, 6e93e4.tmp.6.dr, 6e91ce.tmp.7.dr, 6e9386.tmp.7.dr, 6ea4ee.tmp.14.dr
Source: Binary string: wuser32.pdbUGP source: 6ea267.tmp.14.dr, 6ea451.tmp.14.dr, 6ea335.tmp.14.dr, 6ea15a.tmp.14.dr, 6e91bd.tmp.6.dr, 6e95ab.tmp.6.dr, 6e9385.tmp.6.dr
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1003C600 FindFirstFileA,FindClose,6_2_1003C600
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1002A220 FindFirstFileA,SendMessageA,SendMessageA,FindNextFileA,FindClose,SendMessageA,6_2_1002A220
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10034440 FindNextFileA,FindClose,FindFirstFileA,FindClose,6_2_10034440
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1007C5DB __EH_prolog,GetFullPathNameA,lstrcpynA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrcpyA,6_2_1007C5DB
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10047170 ioctlsocket,recv,recv,6_2_10047170
Source: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllString found in binary or memory: http://68862320bb.d131.tqxq.com/kdc/banben.txt2.5
Source: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllString found in binary or memory: http://68862320bb.d131.tqxq.com/kdc/dqgg.txt
Source: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllString found in binary or memory: http://item.taobao.com/item.htm?id=36149830965
Source: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllString found in binary or memory: http://item.taobao.com/item.htm?id=36149830965http://item.taobao.com/item.htm?id=36151081551http://s
Source: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllString found in binary or memory: http://item.taobao.com/item.htm?id=36151057950
Source: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllString found in binary or memory: http://item.taobao.com/item.htm?id=36151081551
Source: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllString found in binary or memory: http://s.taobao.com/search?initiative_id=staobaoz_20131120&jc=1&q=%C2%E5%C6%E6%D3%A2%D0%DB%B4%AB%D0%
Source: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllString found in binary or memory: http://s.taobao.com/search?q=%C2%E5%C6%E6%D3%A2%D0%DB%B4%AB%D0%FD%B7%E7%B8%A8%D6%FA&searcy_type=item
Source: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllString found in binary or memory: http://s.taobao.com/search?q=%D0%FD%B7%E7%CD%F8%C2%E7%C1%AA%C3%CB%A2%DA&app=shopsearch5
Source: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllString found in binary or memory: http://www.99tianji.com/w55
Source: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllString found in binary or memory: http://www.eyuyan.com)DVarFileInfo$
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1004FE50 GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,GlobalFree,EmptyClipboard,SetClipboardData,CloseClipboard,6_2_1004FE50
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1004FE50 GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,GlobalFree,EmptyClipboard,SetClipboardData,CloseClipboard,6_2_1004FE50
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1004FFA0 OpenClipboard,GetClipboardData,CloseClipboard,GlobalSize,GlobalLock,GlobalUnlock,CloseClipboard,6_2_1004FFA0
Source: 6ea267.tmp.14.drBinary or memory string: GetRawInputDatamemstr_2ce67c2f-6
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1007F18E GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,6_2_1007F18E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1004E6B0 GetKeyState,GetKeyState,GetKeyState,CopyRect,6_2_1004E6B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1003C7B0 GetKeyState,GetKeyState,GetKeyState,GetKeyState,6_2_1003C7B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1003AB00 IsWindowEnabled,TranslateAcceleratorA,IsChild,GetFocus,PostMessageA,PostMessageA,SendMessageA,IsChild,IsWindow,IsWindowVisible,SendMessageA,SendMessageA,SendMessageA,SendMessageA,GetParent,SendMessageA,WinHelpA,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,IsWindow,6_2_1003AB00
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10080D45 GetKeyState,GetKeyState,GetKeyState,GetKeyState,6_2_10080D45
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10017C47 NtQueryInformationProcess,6_2_10017C47
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100450C06_2_100450C0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1006D7706_2_1006D770
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10067A506_2_10067A50
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10077AE06_2_10077AE0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10035F306_2_10035F30
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100741066_2_10074106
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1007E42F6_2_1007E42F
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100328B06_2_100328B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1003EA106_2_1003EA10
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10058A106_2_10058A10
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10034A606_2_10034A60
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1004AB706_2_1004AB70
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10056BB06_2_10056BB0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1003CE706_2_1003CE70
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10066FB06_2_10066FB0
Source: C:\Windows\System32\loaddll32.exeProcess token adjusted: Load DriverJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess token adjusted: SecurityJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 1006D2AF appears 31 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 1007D4F0 appears 44 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 1006DCA4 appears 94 times
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5884 -s 808
Source: 6e9feb.tmp.2.drStatic PE information: Resource name: RT_MESSAGETABLE type: PDP-11 separate I&D executable not stripped
Source: 6e9c29.tmp.2.drStatic PE information: Resource name: RT_MESSAGETABLE type: PDP-11 separate I&D executable not stripped
Source: 6e9da3.tmp.2.drStatic PE information: Resource name: RT_MESSAGETABLE type: PDP-11 separate I&D executable not stripped
Source: 6e9ecf.tmp.2.drStatic PE information: Resource name: RT_MESSAGETABLE type: PDP-11 separate I&D executable not stripped
Source: 6e92c9.tmp.6.drStatic PE information: Resource name: RT_MESSAGETABLE type: PDP-11 separate I&D executable not stripped
Source: 6e8fb6.tmp.6.drStatic PE information: Resource name: RT_MESSAGETABLE type: PDP-11 separate I&D executable not stripped
Source: 6e913f.tmp.6.drStatic PE information: Resource name: RT_MESSAGETABLE type: PDP-11 separate I&D executable not stripped
Source: 6e9491.tmp.6.drStatic PE information: Resource name: RT_MESSAGETABLE type: PDP-11 separate I&D executable not stripped
Source: 6e924c.tmp.7.drStatic PE information: Resource name: RT_MESSAGETABLE type: PDP-11 separate I&D executable not stripped
Source: 6e93e5.tmp.7.drStatic PE information: Resource name: RT_MESSAGETABLE type: PDP-11 separate I&D executable not stripped
Source: 6e8fa6.tmp.7.drStatic PE information: Resource name: RT_MESSAGETABLE type: PDP-11 separate I&D executable not stripped
Source: 6e90f1.tmp.7.drStatic PE information: Resource name: RT_MESSAGETABLE type: PDP-11 separate I&D executable not stripped
Source: 6ea10b.tmp.14.drStatic PE information: Resource name: RT_MESSAGETABLE type: PDP-11 separate I&D executable not stripped
Source: 6ea1f8.tmp.14.drStatic PE information: Resource name: RT_MESSAGETABLE type: PDP-11 separate I&D executable not stripped
Source: 6ea2d6.tmp.14.drStatic PE information: Resource name: RT_MESSAGETABLE type: PDP-11 separate I&D executable not stripped
Source: 6ea402.tmp.14.drStatic PE information: Resource name: RT_MESSAGETABLE type: PDP-11 separate I&D executable not stripped
Source: 6e8fa6.tmp.7.drStatic PE information: No import functions for PE file found
Source: 6e93e5.tmp.7.drStatic PE information: No import functions for PE file found
Source: 6e90f1.tmp.7.drStatic PE information: No import functions for PE file found
Source: 6ea2d6.tmp.14.drStatic PE information: No import functions for PE file found
Source: 6e92c9.tmp.6.drStatic PE information: No import functions for PE file found
Source: 6e9c29.tmp.2.drStatic PE information: No import functions for PE file found
Source: 6e924c.tmp.7.drStatic PE information: No import functions for PE file found
Source: 6e8fb6.tmp.6.drStatic PE information: No import functions for PE file found
Source: 6e9da3.tmp.2.drStatic PE information: No import functions for PE file found
Source: 6ea1f8.tmp.14.drStatic PE information: No import functions for PE file found
Source: 6e9ecf.tmp.2.drStatic PE information: No import functions for PE file found
Source: 6ea402.tmp.14.drStatic PE information: No import functions for PE file found
Source: 6e9feb.tmp.2.drStatic PE information: No import functions for PE file found
Source: 6ea10b.tmp.14.drStatic PE information: No import functions for PE file found
Source: 6e9491.tmp.6.drStatic PE information: No import functions for PE file found
Source: 6e913f.tmp.6.drStatic PE information: No import functions for PE file found
Source: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
Source: 6e9ecf.tmp.2.drBinary string: \Device\IPT[
Source: classification engineClassification label: mal64.evad.winDLL@13/61@0/0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100213B0 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,MulDiv,6_2_100213B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1007F644 FindResourceA,LoadResource,LockResource,6_2_1007F644
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3596:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7280
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5544
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5884
Source: C:\Windows\System32\loaddll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e9c29.tmpJump to behavior
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll, DLL
Source: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllVirustotal: Detection: 48%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll, DLL
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5884 -s 808
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5544 -s 800
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll", DLL
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7280 -s 872
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll, DLL Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll", DLL Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: winmm.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow found: window name: SysTabControl32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\SysWOW64\rundll32.exeWindow detected: Number of UI elements: 20
Source: C:\Windows\SysWOW64\rundll32.exeWindow detected: Number of UI elements: 20
Source: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllStatic file information: File size 1313056 > 1048576
Source: Binary string: wgdi32.pdbUGP source: loaddll32.exe, 00000002.00000003.1345228328.00000000012C7000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000002.00000003.1347663473.00000000012C7000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000002.00000003.1339182709.00000000012B2000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000002.00000003.1342158891.00000000012C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1315072879.0000000002F0F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1321885815.0000000002EFD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.1681788063.0000000002EF9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1316161195.0000000002EFE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1321297230.0000000002EFD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1314214773.0000000002EFE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1315166483.0000000002EFE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1319791841.0000000002EFD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1307539655.0000000002EFF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1314012323.0000000002EA0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1310055446.0000000002E9B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1307060024.0000000002E88000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1317480969.0000000002EA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1352799164.0000000003410000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1355201068.0000000003422000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1359058753.0000000003422000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1349835454.0000000003410000.00000004.00000020.00020000.00000000.sdmp, 6e90c1.tmp.7.dr, 6ea089.tmp.2.dr, 6ea2a6.tmp.14.dr, 6ea3c3.tmp.14.dr, 6e93e4.tmp.6.dr, 6e91ce.tmp.7.dr, 6e9386.tmp.7.dr, 6ea4ee.tmp.14.dr
Source: Binary string: wntdll.pdbUGP source: 6e93e5.tmp.7.dr, 6ea1f8.tmp.14.dr, 6e9c29.tmp.2.dr, 6e924c.tmp.7.dr, 6e90f1.tmp.7.dr, 6ea2d6.tmp.14.dr, 6e8fa6.tmp.7.dr, 6e9ecf.tmp.2.dr
Source: Binary string: wntdll.pdb source: 6e93e5.tmp.7.dr, 6ea1f8.tmp.14.dr, 6e9c29.tmp.2.dr, 6e924c.tmp.7.dr, 6e90f1.tmp.7.dr, 6ea2d6.tmp.14.dr, 6e8fa6.tmp.7.dr, 6e9ecf.tmp.2.dr
Source: Binary string: wuser32.pdb source: 6ea267.tmp.14.dr, 6ea451.tmp.14.dr, 6ea335.tmp.14.dr, 6ea15a.tmp.14.dr, 6e91bd.tmp.6.dr, 6e95ab.tmp.6.dr, 6e9385.tmp.6.dr
Source: Binary string: wgdi32.pdb source: loaddll32.exe, 00000002.00000003.1345228328.00000000012C7000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000002.00000003.1347663473.00000000012C7000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000002.00000003.1339182709.00000000012B2000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000002.00000003.1342158891.00000000012C7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1315072879.0000000002F0F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1321885815.0000000002EFD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.1681788063.0000000002EF9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1316161195.0000000002EFE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1321297230.0000000002EFD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1314214773.0000000002EFE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1315166483.0000000002EFE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1319791841.0000000002EFD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1307539655.0000000002EFF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1314012323.0000000002EA0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1310055446.0000000002E9B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1307060024.0000000002E88000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.1317480969.0000000002EA1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1352799164.0000000003410000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1355201068.0000000003422000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1359058753.0000000003422000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1349835454.0000000003410000.00000004.00000020.00020000.00000000.sdmp, 6e90c1.tmp.7.dr, 6ea089.tmp.2.dr, 6ea2a6.tmp.14.dr, 6ea3c3.tmp.14.dr, 6e93e4.tmp.6.dr, 6e91ce.tmp.7.dr, 6e9386.tmp.7.dr, 6ea4ee.tmp.14.dr
Source: Binary string: wuser32.pdbUGP source: 6ea267.tmp.14.dr, 6ea451.tmp.14.dr, 6ea335.tmp.14.dr, 6ea15a.tmp.14.dr, 6e91bd.tmp.6.dr, 6e95ab.tmp.6.dr, 6e9385.tmp.6.dr
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1007F961 GetModuleHandleA,LoadLibraryA,GetProcAddress,#17,#17,FreeLibrary,6_2_1007F961
Source: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllStatic PE information: section name: .vmp0
Source: 6e9feb.tmp.2.drStatic PE information: section name: RT
Source: 6e9feb.tmp.2.drStatic PE information: section name: .mrdata
Source: 6e9feb.tmp.2.drStatic PE information: section name: .00cfg
Source: 6ea04a.tmp.2.drStatic PE information: section name: .didat
Source: 6ea089.tmp.2.drStatic PE information: section name: .didat
Source: 6e9c29.tmp.2.drStatic PE information: section name: RT
Source: 6e9c29.tmp.2.drStatic PE information: section name: .mrdata
Source: 6e9c29.tmp.2.drStatic PE information: section name: .00cfg
Source: 6e9cf5.tmp.2.drStatic PE information: section name: .didat
Source: 6e9d64.tmp.2.drStatic PE information: section name: .didat
Source: 6e9da3.tmp.2.drStatic PE information: section name: RT
Source: 6e9da3.tmp.2.drStatic PE information: section name: .mrdata
Source: 6e9da3.tmp.2.drStatic PE information: section name: .00cfg
Source: 6e9e02.tmp.2.drStatic PE information: section name: .didat
Source: 6e9e80.tmp.2.drStatic PE information: section name: .didat
Source: 6e9ecf.tmp.2.drStatic PE information: section name: RT
Source: 6e9ecf.tmp.2.drStatic PE information: section name: .mrdata
Source: 6e9ecf.tmp.2.drStatic PE information: section name: .00cfg
Source: 6e9f5d.tmp.2.drStatic PE information: section name: .didat
Source: 6e9fbb.tmp.2.drStatic PE information: section name: .didat
Source: 6e91bd.tmp.6.drStatic PE information: section name: .didat
Source: 6e927a.tmp.6.drStatic PE information: section name: .didat
Source: 6e92c9.tmp.6.drStatic PE information: section name: RT
Source: 6e92c9.tmp.6.drStatic PE information: section name: .mrdata
Source: 6e92c9.tmp.6.drStatic PE information: section name: .00cfg
Source: 6e9385.tmp.6.drStatic PE information: section name: .didat
Source: 6e93e4.tmp.6.drStatic PE information: section name: .didat
Source: 6e8fb6.tmp.6.drStatic PE information: section name: RT
Source: 6e8fb6.tmp.6.drStatic PE information: section name: .mrdata
Source: 6e8fb6.tmp.6.drStatic PE information: section name: .00cfg
Source: 6e9024.tmp.6.drStatic PE information: section name: .didat
Source: 6e90f0.tmp.6.drStatic PE information: section name: .didat
Source: 6e913f.tmp.6.drStatic PE information: section name: RT
Source: 6e913f.tmp.6.drStatic PE information: section name: .mrdata
Source: 6e913f.tmp.6.drStatic PE information: section name: .00cfg
Source: 6e9491.tmp.6.drStatic PE information: section name: RT
Source: 6e9491.tmp.6.drStatic PE information: section name: .mrdata
Source: 6e9491.tmp.6.drStatic PE information: section name: .00cfg
Source: 6e95ab.tmp.6.drStatic PE information: section name: .didat
Source: 6e960a.tmp.6.drStatic PE information: section name: .didat
Source: 6e91ce.tmp.7.drStatic PE information: section name: .didat
Source: 6e924c.tmp.7.drStatic PE information: section name: RT
Source: 6e924c.tmp.7.drStatic PE information: section name: .mrdata
Source: 6e924c.tmp.7.drStatic PE information: section name: .00cfg
Source: 6e92ab.tmp.7.drStatic PE information: section name: .didat
Source: 6e9386.tmp.7.drStatic PE information: section name: .didat
Source: 6e93e5.tmp.7.drStatic PE information: section name: RT
Source: 6e93e5.tmp.7.drStatic PE information: section name: .mrdata
Source: 6e93e5.tmp.7.drStatic PE information: section name: .00cfg
Source: 6e8fa6.tmp.7.drStatic PE information: section name: RT
Source: 6e8fa6.tmp.7.drStatic PE information: section name: .mrdata
Source: 6e8fa6.tmp.7.drStatic PE information: section name: .00cfg
Source: 6e9014.tmp.7.drStatic PE information: section name: .didat
Source: 6e90c1.tmp.7.drStatic PE information: section name: .didat
Source: 6e90f1.tmp.7.drStatic PE information: section name: RT
Source: 6e90f1.tmp.7.drStatic PE information: section name: .mrdata
Source: 6e90f1.tmp.7.drStatic PE information: section name: .00cfg
Source: 6e916f.tmp.7.drStatic PE information: section name: .didat
Source: 6e9444.tmp.7.drStatic PE information: section name: .didat
Source: 6e94d1.tmp.7.drStatic PE information: section name: .didat
Source: 6ea10b.tmp.14.drStatic PE information: section name: RT
Source: 6ea10b.tmp.14.drStatic PE information: section name: .mrdata
Source: 6ea10b.tmp.14.drStatic PE information: section name: .00cfg
Source: 6ea15a.tmp.14.drStatic PE information: section name: .didat
Source: 6ea19a.tmp.14.drStatic PE information: section name: .didat
Source: 6ea1f8.tmp.14.drStatic PE information: section name: RT
Source: 6ea1f8.tmp.14.drStatic PE information: section name: .mrdata
Source: 6ea1f8.tmp.14.drStatic PE information: section name: .00cfg
Source: 6ea267.tmp.14.drStatic PE information: section name: .didat
Source: 6ea2a6.tmp.14.drStatic PE information: section name: .didat
Source: 6ea2d6.tmp.14.drStatic PE information: section name: RT
Source: 6ea2d6.tmp.14.drStatic PE information: section name: .mrdata
Source: 6ea2d6.tmp.14.drStatic PE information: section name: .00cfg
Source: 6ea335.tmp.14.drStatic PE information: section name: .didat
Source: 6ea3c3.tmp.14.drStatic PE information: section name: .didat
Source: 6ea402.tmp.14.drStatic PE information: section name: RT
Source: 6ea402.tmp.14.drStatic PE information: section name: .mrdata
Source: 6ea402.tmp.14.drStatic PE information: section name: .00cfg
Source: 6ea451.tmp.14.drStatic PE information: section name: .didat
Source: 6ea4ee.tmp.14.drStatic PE information: section name: .didat
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D3172 push edx; mov dword ptr [esp], ebp6_2_100D3173
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D3172 push edi; mov dword ptr [esp], ecx6_2_100D423A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D31F2 push dword ptr [esp+34h]; retn 0038h6_2_100D3218
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D3203 push dword ptr [esp+34h]; retn 0038h6_2_100D3218
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D541A pushad ; retf 6_2_100D541E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D544C pushfd ; mov dword ptr [esp], 1D1AA032h6_2_100D5450
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D345A push edi; mov dword ptr [esp], ebx6_2_100D3A97
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D547B pushfd ; mov dword ptr [esp], 1D1AA032h6_2_100D5450
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D3484 pushfd ; mov dword ptr [esp], ebp6_2_100D348E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D353A push BF49E822h; mov dword ptr [esp], esp6_2_100D43F5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D35BC pushfd ; mov dword ptr [esp], EAB2D7E3h6_2_100D35CE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D35C8 pushfd ; mov dword ptr [esp], EAB2D7E3h6_2_100D35CE
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D3936 push edi; mov dword ptr [esp], ecx6_2_100D423A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D397B push dword ptr [esp+58h]; retn 005Ch6_2_100D40DB
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D39B2 push dword ptr [esp+58h]; retn 005Ch6_2_100D40DB
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D39E0 push dword ptr [esp+58h]; retn 005Ch6_2_100D40DB
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D3A96 push edi; mov dword ptr [esp], ebx6_2_100D3A97
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D3B01 pushfd ; mov dword ptr [esp], esi6_2_100D3F8B
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1006DCA4 push eax; ret 6_2_1006DCC2
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D3E35 push 5D07112Fh; mov dword ptr [esp], 17937626h6_2_100D47F7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D3E43 pushfd ; mov dword ptr [esp], ebp6_2_100D3E49
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D403F push dword ptr [esp+58h]; retn 005Ch6_2_100D40DB
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D4134 push DF8CE067h; mov dword ptr [esp], A81949E5h6_2_100D4139
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D4234 push edi; mov dword ptr [esp], ecx6_2_100D423A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D45CD push dword ptr [esp+34h]; retn 0038h6_2_100D460E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D461D push edx; mov dword ptr [esp], 93984BB2h6_2_100D4623
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100D4611 push edx; mov dword ptr [esp], 93984BB2h6_2_100D4623
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1006CC90 push eax; ret 6_2_1006CCBE
Source: 6e9feb.tmp.2.drStatic PE information: section name: .text entropy: 6.844715065913507
Source: 6e9c29.tmp.2.drStatic PE information: section name: .text entropy: 6.844715065913507
Source: 6e9da3.tmp.2.drStatic PE information: section name: .text entropy: 6.844715065913507
Source: 6e9ecf.tmp.2.drStatic PE information: section name: .text entropy: 6.844715065913507
Source: 6e92c9.tmp.6.drStatic PE information: section name: .text entropy: 6.844715065913507
Source: 6e8fb6.tmp.6.drStatic PE information: section name: .text entropy: 6.844715065913507
Source: 6e913f.tmp.6.drStatic PE information: section name: .text entropy: 6.844715065913507
Source: 6e9491.tmp.6.drStatic PE information: section name: .text entropy: 6.844715065913507
Source: 6e924c.tmp.7.drStatic PE information: section name: .text entropy: 6.844715065913507
Source: 6e93e5.tmp.7.drStatic PE information: section name: .text entropy: 6.844715065913507
Source: 6e8fa6.tmp.7.drStatic PE information: section name: .text entropy: 6.844715065913507
Source: 6e90f1.tmp.7.drStatic PE information: section name: .text entropy: 6.844715065913507
Source: 6ea10b.tmp.14.drStatic PE information: section name: .text entropy: 6.844715065913507
Source: 6ea1f8.tmp.14.drStatic PE information: section name: .text entropy: 6.844715065913507
Source: 6ea2d6.tmp.14.drStatic PE information: section name: .text entropy: 6.844715065913507
Source: 6ea402.tmp.14.drStatic PE information: section name: .text entropy: 6.844715065913507
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e9444.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e90f0.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e90f1.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6ea4ee.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e9fbb.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6ea2a6.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e91bd.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e9c29.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e913f.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e92ab.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e93e4.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e92c9.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6ea267.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e924c.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6ea402.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e93e5.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeFile created: C:\Users\user\AppData\Local\Temp\6ea04a.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6ea10b.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6ea15a.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e94d1.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeFile created: C:\Users\user\AppData\Local\Temp\6ea089.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e9d64.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e9385.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e9024.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6ea2d6.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e960a.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e9da3.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e90c1.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e9491.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6ea451.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e9e80.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e927a.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e9feb.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e9e02.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e8fb6.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e9ecf.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6ea335.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e95ab.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e9cf5.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e9014.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e916f.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6ea1f8.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6ea19a.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6ea3c3.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e91ce.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e9f5d.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e9386.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\AppData\Local\Temp\6e8fa6.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1006B23D IsIconic,GetWindowPlacement,GetWindowRect,6_2_1006B23D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10037A70 DestroyCursor,IsWindowVisible,IsIconic,IsZoomed,GetWindowRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMenu,DeleteMenu,GetSystemMenu,6_2_10037A70
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1003BCF0 IsIconic,IsZoomed,GetWindowRect,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,IsWindow,ShowWindow,6_2_1003BCF0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10038140 IsIconic,IsZoomed,6_2_10038140
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100328B0 IsWindow,IsIconic,SetActiveWindow,IsWindow,IsWindow,DestroyAcceleratorTable,DestroyMenu,DestroyAcceleratorTable,DestroyMenu,DestroyAcceleratorTable,DestroyMenu,SetParent,SetWindowPos,IsWindow,SendMessageA,SendMessageA,DestroyAcceleratorTable,IsWindow,IsWindow,IsWindow,IsWindow,IsWindow,GetParent,GetFocus,IsWindow,SendMessageA,IsWindow,GetFocus,SetFocus,6_2_100328B0
Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\loaddll32.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e9444.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e90f0.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e90f1.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6ea4ee.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e9fbb.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6ea2a6.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e91bd.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e9c29.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e913f.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e92ab.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e93e4.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e92c9.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6ea267.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e924c.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6ea402.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e93e5.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6ea04a.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6ea10b.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6ea15a.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e94d1.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6ea089.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e9d64.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e9385.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6ea2d6.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e9024.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e960a.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e9da3.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e90c1.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6ea451.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e9491.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e9e80.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e927a.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e9e02.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e9feb.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e8fb6.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6ea335.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e9ecf.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e95ab.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e9cf5.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e9014.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e916f.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6ea1f8.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6ea19a.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6ea3c3.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e91ce.tmpJump to dropped file
Source: C:\Windows\System32\loaddll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e9f5d.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e9386.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\6e8fa6.tmpJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 3.5 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1003C600 FindFirstFileA,FindClose,6_2_1003C600
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1002A220 FindFirstFileA,SendMessageA,SendMessageA,FindNextFileA,FindClose,SendMessageA,6_2_1002A220
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10034440 FindNextFileA,FindClose,FindFirstFileA,FindClose,6_2_10034440
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1007C5DB __EH_prolog,GetFullPathNameA,lstrcpynA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrcpyA,6_2_1007C5DB
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1007F961 GetModuleHandleA,LoadLibraryA,GetProcAddress,#17,#17,FreeLibrary,6_2_1007F961
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100179C0 mov esi, dword ptr fs:[00000030h]6_2_100179C0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1001E6BF mov ecx, dword ptr fs:[00000030h]6_2_1001E6BF
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_10021CF0 GetProcessHeap,RtlAllocateHeap,6_2_10021CF0
Source: C:\Windows\System32\loaddll32.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1001797C RtlAddVectoredExceptionHandler,6_2_1001797C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100767B5 SetUnhandledExceptionFilter,6_2_100767B5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_100767C7 SetUnhandledExceptionFilter,6_2_100767C7
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll",#1Jump to behavior
Source: 6ea267.tmp.14.dr, 6ea451.tmp.14.dr, 6ea335.tmp.14.dr, 6ea15a.tmp.14.dr, 6e91bd.tmp.6.dr, 6e95ab.tmp.6.drBinary or memory string: GetProgmanWindow
Source: 6ea267.tmp.14.dr, 6ea451.tmp.14.dr, 6ea335.tmp.14.dr, 6ea15a.tmp.14.dr, 6e91bd.tmp.6.dr, 6e95ab.tmp.6.drBinary or memory string: SetProgmanWindow
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1006E20A GetLocalTime,GetSystemTime,GetTimeZoneInformation,6_2_1006E20A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1006E20A GetLocalTime,GetSystemTime,GetTimeZoneInformation,6_2_1006E20A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_1008636B GetVersion,GetProcessVersion,LoadCursorA,LoadCursorA,LoadCursorA,6_2_1008636B
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
LSASS Driver
12
Process Injection
1
Virtualization/Sandbox Evasion
21
Input Capture
2
System Time Discovery
Remote Services21
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
LSASS Driver
12
Process Injection
LSASS Memory1
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
Security Account Manager1
Process Discovery
SMB/Windows Admin Shares3
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
Obfuscated Files or Information
NTDS1
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Rundll32
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Software Packing
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync4
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1431433 Sample: SecuriteInfo.com.Win32.Evo-... Startdate: 25/04/2024 Architecture: WINDOWS Score: 64 64 Antivirus / Scanner detection for submitted sample 2->64 66 Multi AV Scanner detection for submitted file 2->66 68 Machine Learning detection for sample 2->68 8 loaddll32.exe 13 2->8         started        process3 file4 40 C:\Users\user\AppData\Local\Temp\6ea089.tmp, PE32 8->40 dropped 42 C:\Users\user\AppData\Local\Temp\6ea04a.tmp, PE32 8->42 dropped 44 C:\Users\user\AppData\Local\Temp\6e9feb.tmp, PE32 8->44 dropped 46 9 other files (none is malicious) 8->46 dropped 72 Renames NTDLL to bypass HIPS 8->72 12 cmd.exe 1 8->12         started        14 rundll32.exe 12 8->14         started        18 rundll32.exe 12 8->18         started        20 conhost.exe 8->20         started        signatures5 process6 file7 22 rundll32.exe 12 12->22         started        48 C:\Users\user\AppData\Local\Temp\6e960a.tmp, PE32 14->48 dropped 50 C:\Users\user\AppData\Local\Temp\6e95ab.tmp, PE32 14->50 dropped 52 C:\Users\user\AppData\Local\Temp\6e9491.tmp, PE32 14->52 dropped 60 9 other files (none is malicious) 14->60 dropped 74 Renames NTDLL to bypass HIPS 14->74 26 WerFault.exe 16 14->26         started        54 C:\Users\user\AppData\Local\Temp\6ea4ee.tmp, PE32 18->54 dropped 56 C:\Users\user\AppData\Local\Temp\6ea451.tmp, PE32 18->56 dropped 58 C:\Users\user\AppData\Local\Temp\6ea402.tmp, PE32 18->58 dropped 62 9 other files (none is malicious) 18->62 dropped 28 WerFault.exe 3 16 18->28         started        signatures8 process9 file10 32 C:\Users\user\AppData\Local\Temp\6e94d1.tmp, PE32 22->32 dropped 34 C:\Users\user\AppData\Local\Temp\6e9444.tmp, PE32 22->34 dropped 36 C:\Users\user\AppData\Local\Temp\6e93e5.tmp, PE32 22->36 dropped 38 9 other files (none is malicious) 22->38 dropped 70 Renames NTDLL to bypass HIPS 22->70 30 WerFault.exe 20 16 22->30         started        signatures11 process12

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll49%VirustotalBrowse
SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll100%AviraTR/Crypt.XPACK.Gen
SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\6e8fa6.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e8fa6.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e8fb6.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e8fb6.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e9014.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e9014.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e9024.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e9024.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e90c1.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e90c1.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e90f0.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e90f0.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e90f1.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e90f1.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e913f.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e913f.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e916f.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e916f.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e91bd.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e91bd.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e91ce.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e91ce.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e924c.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e924c.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e927a.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e927a.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e92ab.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e92ab.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e92c9.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e92c9.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e9385.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e9385.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e9386.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e9386.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e93e4.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e93e4.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e93e5.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e93e5.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e9444.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e9444.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e9491.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e9491.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\6e94d1.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\6e94d1.tmp0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.eyuyan.com)DVarFileInfo$0%Avira URL Cloudsafe
http://68862320bb.d131.tqxq.com/kdc/dqgg.txt0%Avira URL Cloudsafe
http://www.99tianji.com/w550%Avira URL Cloudsafe
http://68862320bb.d131.tqxq.com/kdc/banben.txt2.50%Avira URL Cloudsafe
http://68862320bb.d131.tqxq.com/kdc/banben.txt2.50%VirustotalBrowse
http://68862320bb.d131.tqxq.com/kdc/dqgg.txt2%VirustotalBrowse
http://www.99tianji.com/w556%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://s.taobao.com/search?initiative_id=staobaoz_20131120&jc=1&q=%C2%E5%C6%E6%D3%A2%D0%DB%B4%AB%D0%SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllfalse
    high
    http://www.eyuyan.com)DVarFileInfo$SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllfalse
    • Avira URL Cloud: safe
    low
    http://item.taobao.com/item.htm?id=36149830965http://item.taobao.com/item.htm?id=36151081551http://sSecuriteInfo.com.Win32.Evo-gen.28674.10592.dllfalse
      high
      http://item.taobao.com/item.htm?id=36149830965SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllfalse
        high
        http://68862320bb.d131.tqxq.com/kdc/banben.txt2.5SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://item.taobao.com/item.htm?id=36151057950SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllfalse
          high
          http://www.99tianji.com/w55SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllfalse
          • 6%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://item.taobao.com/item.htm?id=36151081551SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllfalse
            high
            http://s.taobao.com/search?q=%D0%FD%B7%E7%CD%F8%C2%E7%C1%AA%C3%CB%A2%DA&app=shopsearch5SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllfalse
              high
              http://68862320bb.d131.tqxq.com/kdc/dqgg.txtSecuriteInfo.com.Win32.Evo-gen.28674.10592.dllfalse
              • 2%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://s.taobao.com/search?q=%C2%E5%C6%E6%D3%A2%D0%DB%B4%AB%D0%FD%B7%E7%B8%A8%D6%FA&searcy_type=itemSecuriteInfo.com.Win32.Evo-gen.28674.10592.dllfalse
                high
                No contacted IP infos
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1431433
                Start date and time:2024-04-25 05:33:35 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 8m 56s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Run name:Run with higher sleep bypass
                Number of analysed new started processes analysed:24
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll
                Detection:MAL
                Classification:mal64.evad.winDLL@13/61@0/0
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 95%
                • Number of executed functions: 33
                • Number of non-executed functions: 201
                Cookbook Comments:
                • Found application associated with file extension: .dll
                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 72.21.81.240, 20.189.173.22
                • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, wu.ec.azureedge.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, blobcollector.events.data.trafficmanager.net, hlb.apr-52dd2-0.edgecastdns.net, umwatson.events.data.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size getting too big, too many NtSetInformationFile calls found.
                No simulations
                No context
                No context
                No context
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                C:\Users\user\AppData\Local\Temp\6e8fa6.tmpSecuriteInfo.com.Win32.DropperX-gen.25624.11389.exeGet hashmaliciousUnknownBrowse
                  SecuriteInfo.com.Trojan.Siggen19.27544.4289.6649.exeGet hashmaliciousUnknownBrowse
                    SecuriteInfo.com.Trojan.Siggen19.27544.16723.4470.exeGet hashmaliciousUnknownBrowse
                      SecuriteInfo.com.Variant.Bulz.467496.20475.7100.exeGet hashmaliciousUnknownBrowse
                        SecuriteInfo.com.FileRepMalware.8987.8491.exeGet hashmaliciousUnknownBrowse
                          SecuriteInfo.com.Variant.Bulz.467496.20475.7100.exeGet hashmaliciousUnknownBrowse
                            SecuriteInfo.com.FileRepMalware.1486.14630.exeGet hashmaliciousUnknownBrowse
                              SecuriteInfo.com.Win32.Evo-gen.19982.21920.dllGet hashmaliciousUnknownBrowse
                                SecuriteInfo.com.Win32.Evo-gen.19982.21920.dllGet hashmaliciousUnknownBrowse
                                  C:\Users\user\AppData\Local\Temp\6e8fb6.tmpSecuriteInfo.com.Win32.DropperX-gen.25624.11389.exeGet hashmaliciousUnknownBrowse
                                    SecuriteInfo.com.Trojan.Siggen19.27544.4289.6649.exeGet hashmaliciousUnknownBrowse
                                      SecuriteInfo.com.Trojan.Siggen19.27544.16723.4470.exeGet hashmaliciousUnknownBrowse
                                        SecuriteInfo.com.Variant.Bulz.467496.20475.7100.exeGet hashmaliciousUnknownBrowse
                                          SecuriteInfo.com.FileRepMalware.8987.8491.exeGet hashmaliciousUnknownBrowse
                                            SecuriteInfo.com.Variant.Bulz.467496.20475.7100.exeGet hashmaliciousUnknownBrowse
                                              SecuriteInfo.com.FileRepMalware.1486.14630.exeGet hashmaliciousUnknownBrowse
                                                SecuriteInfo.com.Win32.Evo-gen.19982.21920.dllGet hashmaliciousUnknownBrowse
                                                  SecuriteInfo.com.Win32.Evo-gen.19982.21920.dllGet hashmaliciousUnknownBrowse
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):65536
                                                    Entropy (8bit):0.9410585277136831
                                                    Encrypted:false
                                                    SSDEEP:192:D4iHOXy06P+8jeT7RDzuiFZZ24IO84ci:siuX56P+8je9zuiFZY4IO84ci
                                                    MD5:ED3964222CF2B4BB80E46722452DE73F
                                                    SHA1:A70B53E89A643E3D0964A920AE52B4CC8BA4F890
                                                    SHA-256:B7B458066E378EC070A79E9D53BB70A87857AA2A5F80D267F8D752F56D216318
                                                    SHA-512:43689866297D1E4947F0AFD6E2E7A6E159E931B935A0A0CA5CE22B0A771D655DD36CF21D81D7E1FE01D62061DD27EE31DAA3FA71CEF745DB40305769D7C20232
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.4.8.9.6.6.8.2.5.1.8.9.7.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.4.8.9.6.6.8.6.4.2.5.1.1.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.2.d.5.e.5.d.6.-.c.0.7.f.-.4.2.e.8.-.b.1.e.2.-.2.0.f.3.2.a.5.7.b.b.2.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.1.a.e.c.4.f.4.-.7.3.a.0.-.4.a.a.0.-.a.1.7.e.-.b.c.d.1.a.a.d.c.1.c.4.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.7.0.-.0.0.0.1.-.0.0.1.4.-.1.9.e.c.-.1.a.7.9.c.1.9.6.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.2.d.7.!.r.
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):65536
                                                    Entropy (8bit):0.9417226488075008
                                                    Encrypted:false
                                                    SSDEEP:192:sli6Ory06P+8jeT7RDzuiFZZ24IO84ci:6ibr56P+8je9zuiFZY4IO84ci
                                                    MD5:928AB89BE2B908EA0742B1B98DE70E66
                                                    SHA1:9F2BEABF9AB88EB827532B5F669BEBA1867EDD81
                                                    SHA-256:A375322B447C4A74061CF886CD3CADB151CBB1459233ACE4AB827B06A9B3C3F0
                                                    SHA-512:EECE0DC28B71CC3B623243CF59D11E83F722914F7329E64AC77C77F85E36BB7F2366DA28F489419E03AA63B285BFBD1773D3D2B107A69F0C022E5B318B20AA7A
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.4.8.9.6.6.4.6.0.3.0.5.5.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.4.8.9.6.6.5.6.0.3.0.8.8.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.d.0.4.5.1.8.3.-.0.0.5.2.-.4.7.6.5.-.9.d.6.9.-.f.1.c.0.1.3.3.7.5.3.4.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.6.6.f.4.5.a.7.-.8.6.c.1.-.4.b.5.6.-.8.9.b.8.-.6.6.c.6.3.9.7.1.8.5.1.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.f.c.-.0.0.0.1.-.0.0.1.4.-.8.2.8.b.-.7.4.7.6.c.1.9.6.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.2.d.7.!.r.
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):65536
                                                    Entropy (8bit):0.9415430024482506
                                                    Encrypted:false
                                                    SSDEEP:192:BcSHim4Owy06P+8jeT7RDzuiFZZ24IO84ci:Brimpw56P+8je9zuiFZY4IO84ci
                                                    MD5:663D758B66CCD85C4E4E6FF43BEE40AC
                                                    SHA1:DD41299B9621D08C83FFD6532C41B40B0CE0C830
                                                    SHA-256:CE3DF7D104C78D94ABCC0A11BF81D88E24E3214A9929698AFE4662F4E14D7EA8
                                                    SHA-512:B0287D8F33C50659AE7981A3EAAAA7AA7D5F153831E0C0D16571DD04C517183CD04A37B19F7C8AECBDEC2ED26A200DB6E217C64FCD816CA7C11C7C5716EA5E93
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.4.8.9.6.6.4.6.7.7.9.2.8.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.4.8.9.6.6.5.5.9.9.8.3.3.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.c.c.8.9.5.7.8.-.c.f.2.4.-.4.4.a.4.-.a.2.d.6.-.e.7.7.6.6.c.c.6.3.d.f.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.1.f.9.0.5.9.3.-.e.a.6.6.-.4.5.5.7.-.b.e.e.7.-.8.1.3.2.0.5.5.5.5.f.0.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.a.8.-.0.0.0.1.-.0.0.1.4.-.f.9.d.1.-.7.2.7.6.c.1.9.6.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.2.d.7.!.r.
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:Mini DuMP crash report, 15 streams, Thu Apr 25 03:34:24 2024, 0x1205a4 type
                                                    Category:dropped
                                                    Size (bytes):43558
                                                    Entropy (8bit):2.0238282888654857
                                                    Encrypted:false
                                                    SSDEEP:192:tiurO+9zO5H4dM9tTRUWuLDK+H32b3FaS5Paxc:/rO+9q5HIM9rUtG+O0Xc
                                                    MD5:2C56EA1FA8580285EC914B40239BD7EC
                                                    SHA1:81A0E4F58166E9D4B651F0192978EA1B8538CEE3
                                                    SHA-256:6EB37013DCD238B337E41586A0A84DB04B3737C78FDE39D7D6AC829730361580
                                                    SHA-512:EBB7ED2FD9CBFFB4AC23D99424E22A80DE164B54A1FA8421D253A6BA8D10444A4C3182FBAE8C9C694330CB664784EEEBFBEDB2B5E86B4901300A897EF5549089
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:MDMP..a..... .......@.)f....................................$...............Z/..........`.......8...........T...............6.......................................................................................................eJ......(.......GenuineIntel............T...........>.)f.............................0..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:Mini DuMP crash report, 15 streams, Thu Apr 25 03:34:24 2024, 0x1205a4 type
                                                    Category:dropped
                                                    Size (bytes):44154
                                                    Entropy (8bit):1.9948715879030372
                                                    Encrypted:false
                                                    SSDEEP:192:tVurO+Z7fO5H4dM9/X7zZ+qqI73Q4FtuebjhIw39l:GrO+VW5HIM9/X3Z+qqI7BtzyKl
                                                    MD5:8B73D2C67D8F67F07123774C104722E6
                                                    SHA1:54D00D6DE06618B149753BCABAAB1C57E7B67D7B
                                                    SHA-256:4CC46822760A49492A4B1DAA844BC2A592F969BA23F27455F90884A05D5013B1
                                                    SHA-512:A05A0320A0679D6C89C713C295849E78326A76D332ACC276FAC048135BBF0D2E7DBFB80DDACB226B618BE3B372192B28148A36C7F608D2B83A6AB4450A3E6690
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:MDMP..a..... .......@.)f....................................$...............Z/..........`.......8...........T......................................................................................................................eJ......(.......GenuineIntel............T...........>.)f.............................0..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8342
                                                    Entropy (8bit):3.691918749645578
                                                    Encrypted:false
                                                    SSDEEP:192:R6l7wVeJ8D6D6Y+K6Ggmf8RJvopDO89bX2sfj9m:R6lXJY6D6YT6Ggmf8RJvCXVfE
                                                    MD5:4840317AC383B523892BF0A2674B16FA
                                                    SHA1:E736F42FDFCEB4DD9BD86217A29925DE31E3A32A
                                                    SHA-256:2D16B220A0FC48B37FFEDD034989AC100806932D125F7B44598F6F9AFC742731
                                                    SHA-512:DA3158DEFC99FBCA9D1338E551392DADEF43C8DD0068D1304C95309F409ED9CCED1B68A67122C4C0612E103466C32E7A597BC599043813C1B6CE4243D2505020
                                                    Malicious:false
                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.8.8.4.<./.P.i.
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8348
                                                    Entropy (8bit):3.6904699834281316
                                                    Encrypted:false
                                                    SSDEEP:192:R6l7wVeJFe6qZ6Y7n6Qgmf8RJvopD789bXIsfC9m:R6lXJ86E6Yb6Qgmf8RJv5X7fB
                                                    MD5:4208A25DD404671D41EB5EFCEC4A85AE
                                                    SHA1:630601CF4B56CE006C03F09860CD987586FD1000
                                                    SHA-256:6B2E98A0658017BE90022BF6DB53D255D8AEE4342F2B456D8B88E62252C0DF0D
                                                    SHA-512:1FE58305D2682366307DDAA9143AF3269E8E38DF9C72390DB279AD0F2BBC39BDA7708CD0CADE934BEF12C00A1002F9D1D12A978F3B7712227C65D50C90F21A21
                                                    Malicious:false
                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.5.4.4.<./.P.i.
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4757
                                                    Entropy (8bit):4.447565694107709
                                                    Encrypted:false
                                                    SSDEEP:48:cvIwWl8zsZJg77aI9uBWpW8VYaPYm8M4JCdPlF6+q8vjPNoGScSUd:uIjfrI7oQ7VrSJLK2J3Ud
                                                    MD5:CA66891BB74499607E94B0C1F0C8FAAA
                                                    SHA1:915C8B925A303B4F6B1A8F6A3E9E8E9A53D78C86
                                                    SHA-256:43BB61DF9AE3AB018ADF618D407CE8591BDF18EE61E3FAC11D4417F66C4EA5C0
                                                    SHA-512:AD29234DC5C9765F8CF1A6FBD053A5AF1EDC50D74FA68A6B76A0538922B02ECF9DA4B968D0990C9ADC919940ED4E8C2856DBC597AAE62B3FCEC090A8C93E8AED
                                                    Malicious:false
                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="294877" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4757
                                                    Entropy (8bit):4.4460035769158
                                                    Encrypted:false
                                                    SSDEEP:48:cvIwWl8zsZJg77aI9uBWpW8VYsYm8M4JCdPlFvk+q8vjPFGScSxd:uIjfrI7oQ7VMJlKZJ3xd
                                                    MD5:7CF147FBFDE5F6284B879332A1221C52
                                                    SHA1:57C946D78D8DF7F65D3F066DE7537AE99F4814E2
                                                    SHA-256:878F0BBA862C0E0B6728759F9E9FA5449296672BAE42452E354CA55FD65B797C
                                                    SHA-512:595A99AA4AFF9947347C04E053486BE2F70619A6C119D439C8F360E92E76FCB4D7D579F3E884706DF45263C96B8EDAE673A99957ED866FFA100B4683A0685A9D
                                                    Malicious:false
                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="294877" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:Mini DuMP crash report, 15 streams, Thu Apr 25 03:34:28 2024, 0x1205a4 type
                                                    Category:dropped
                                                    Size (bytes):44014
                                                    Entropy (8bit):2.0950450191628387
                                                    Encrypted:false
                                                    SSDEEP:192:pJWGIurO+bvO5H4dM9hb+Beq1qKH+MDpTLCe:71LrO+y5HIM9hb+QiqwDB+e
                                                    MD5:23D6E939B9BFA6662D39DD75BD1E2AB3
                                                    SHA1:CAB7616187632F901651738D5B9356C50D6E0E28
                                                    SHA-256:F16A54BCBF38DA9F6F4E3A67170C0115AA967CA2647A0950E7A1B619BFD34E68
                                                    SHA-512:9A8F2F102DA83F07F69A5B9B129757EE7F82EC4419FFD8C61520E550E6BAA6246A1F28B2BDE2A17224540DBF21AFE8B846C6877C52BD101BB71259144B95DB75
                                                    Malicious:false
                                                    Preview:MDMP..a..... .......D.)f....................................$...............Z/..........`.......8...........T............"..........................................................................................................eJ......(.......GenuineIntel............T.......p...B.)f.............................0..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8362
                                                    Entropy (8bit):3.691155021332479
                                                    Encrypted:false
                                                    SSDEEP:192:R6l7wVeJA46P6Y7b66zgmf8RJvopDO89b7csfOJm:R6lXJf6P6YX6Ogmf8RJvC7vfR
                                                    MD5:0D557091566DEBBE87EF37B7822C3EEE
                                                    SHA1:CA925F05394636250A9BAD0260661C278DA20F96
                                                    SHA-256:E893C1DC9B8043ADE6648D0994592EB431BCA23BE727D0300569A874A08E3A0E
                                                    SHA-512:AED2F7549EDED0E740240E08F491859CD1864297BE9A8D2A80E6B08C604F777E70D1A552DE5E9A67C481346ABBFFF81667318814D08D46872AD52C050886FA35
                                                    Malicious:false
                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.2.8.0.<./.P.i.
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4757
                                                    Entropy (8bit):4.4390763611461175
                                                    Encrypted:false
                                                    SSDEEP:48:cvIwWl8zsZJg77aI9uBWpW8VYCYm8M4JCdPlF27+q8vjPnGScS8d:uIjfrI7oQ7ViJr7KjJ38d
                                                    MD5:FA9FF8A5D87990208B8A1136A5483917
                                                    SHA1:ED1BCD408E573F1A429C52C48434459E74EFCF17
                                                    SHA-256:BE7807B729E72C48689D9C1559368D576578BA2FEA691F0A9E6D71912539BA62
                                                    SHA-512:A7EB7C6E0ED55BFCF978170BA65116385DD93BAEB6E4D481B5CD4AACA031D6C63F5076C85037054FE2C0BCC9F2B509B7BCCBE7C110EEF8C76D0DE6D3C9D5C438
                                                    Malicious:false
                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="294877" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1699896
                                                    Entropy (8bit):6.290547513916722
                                                    Encrypted:false
                                                    SSDEEP:24576:0Na0qyFU/vb313JPCGucMBbruVALdpNQHKl3y9UfSj6HYZY8zCixcq:kFU3b3HucMBbrb/qj98deCNq
                                                    MD5:5564A98A4692BA8B2D25770FB834D5F6
                                                    SHA1:129D030D817F6B25D1FDEF2CAD33EB81DE1DEA8B
                                                    SHA-256:28AB9A0F5F50FD5398324B5EC099F5C53C6FAA701C3F6D8B0B3DA47A76C56230
                                                    SHA-512:D803E2E3425095E170910103A4470C598FD4A9A10C1217A006A6393CD1ECA06D1C628E845F6FD1071F1C92778D481F47E4E5F175005FEC2CB0A7519C90992858
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Joe Sandbox View:
                                                    • Filename: SecuriteInfo.com.Win32.DropperX-gen.25624.11389.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.Trojan.Siggen19.27544.4289.6649.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.Trojan.Siggen19.27544.16723.4470.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.Variant.Bulz.467496.20475.7100.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.FileRepMalware.8987.8491.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.Variant.Bulz.467496.20475.7100.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.FileRepMalware.1486.14630.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.Win32.Evo-gen.19982.21920.dll, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.Win32.Evo-gen.19982.21920.dll, Detection: malicious, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.=FizS.izS.izS.2.P.jzS.}.S.hzS.}.P./zS.}.].q{S.}.V.rzS.}.W..zS.}...hzS.}.Q.hzS.RichizS.........................PE..L..................!.........................0....(K.........................@......,.....@A............................U...............................8`.......Q..0z..p............................................................................text...%........................... ..`RT.................................. ..`PAGE....:.... ...................... ..`.data....Z...0......................@....mrdata.x#.......$..................@....00cfg...............:..............@..@.rsrc................<..............@..@.reloc...Q.......R...>..............@..B................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1699896
                                                    Entropy (8bit):6.290547513916722
                                                    Encrypted:false
                                                    SSDEEP:24576:0Na0qyFU/vb313JPCGucMBbruVALdpNQHKl3y9UfSj6HYZY8zCixcq:kFU3b3HucMBbrb/qj98deCNq
                                                    MD5:5564A98A4692BA8B2D25770FB834D5F6
                                                    SHA1:129D030D817F6B25D1FDEF2CAD33EB81DE1DEA8B
                                                    SHA-256:28AB9A0F5F50FD5398324B5EC099F5C53C6FAA701C3F6D8B0B3DA47A76C56230
                                                    SHA-512:D803E2E3425095E170910103A4470C598FD4A9A10C1217A006A6393CD1ECA06D1C628E845F6FD1071F1C92778D481F47E4E5F175005FEC2CB0A7519C90992858
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Joe Sandbox View:
                                                    • Filename: SecuriteInfo.com.Win32.DropperX-gen.25624.11389.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.Trojan.Siggen19.27544.4289.6649.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.Trojan.Siggen19.27544.16723.4470.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.Variant.Bulz.467496.20475.7100.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.FileRepMalware.8987.8491.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.Variant.Bulz.467496.20475.7100.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.FileRepMalware.1486.14630.exe, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.Win32.Evo-gen.19982.21920.dll, Detection: malicious, Browse
                                                    • Filename: SecuriteInfo.com.Win32.Evo-gen.19982.21920.dll, Detection: malicious, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.=FizS.izS.izS.2.P.jzS.}.S.hzS.}.P./zS.}.].q{S.}.V.rzS.}.W..zS.}...hzS.}.Q.hzS.RichizS.........................PE..L..................!.........................0....(K.........................@......,.....@A............................U...............................8`.......Q..0z..p............................................................................text...%........................... ..`RT.................................. ..`PAGE....:.... ...................... ..`.data....Z...0......................@....mrdata.x#.......$..................@....00cfg...............:..............@..@.rsrc................<..............@..@.reloc...Q.......R...>..............@..B................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1679648
                                                    Entropy (8bit):5.3288490918902225
                                                    Encrypted:false
                                                    SSDEEP:24576:nB79uCigstmh6JVZ3et1NtJJBwuCx59U4IgL5pc6:JXh2LeXJBwuOTU4I56
                                                    MD5:2E8AB67DC55089DFBCBFA7710BD15B07
                                                    SHA1:159434853CE512029314C6B70070220D251A924A
                                                    SHA-256:2BCC4FD8A4D3C4033A81702E1B685860BE78D6F1A7E980F2E7593C59656F2706
                                                    SHA-512:7898B7B48685A2079BC77210464C448025E5BECB25EDDF3FB612A320B627FDB45AFF12D4913ADA98524E2C4718D74E911CE007F4DE6E3F2BB7184CDFAC5A0E5F
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......l=..(\.H(\.H(\.H!$4Hd\.H<7.I!\.H(\.H)X.H<7.I)\.H<7.I!\.H<7.I.\.H<7.I'\.H<7XH)\.H<7.I)\.HRich(\.H........PE..L...-..?...........!.....0...:...............@.....i................................=.....@A............................(s..X...\.... ...............B.. _...@..$g.. Q..T...............................................L...<........................text...8/.......0.................. ..`.data....2...@.......4..............@....idata..`............<..............@..@.didat..x...........................@....rsrc........ ......................@..@.reloc..$g...@...h..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1679648
                                                    Entropy (8bit):5.3288490918902225
                                                    Encrypted:false
                                                    SSDEEP:24576:nB79uCigstmh6JVZ3et1NtJJBwuCx59U4IgL5pc6:JXh2LeXJBwuOTU4I56
                                                    MD5:2E8AB67DC55089DFBCBFA7710BD15B07
                                                    SHA1:159434853CE512029314C6B70070220D251A924A
                                                    SHA-256:2BCC4FD8A4D3C4033A81702E1B685860BE78D6F1A7E980F2E7593C59656F2706
                                                    SHA-512:7898B7B48685A2079BC77210464C448025E5BECB25EDDF3FB612A320B627FDB45AFF12D4913ADA98524E2C4718D74E911CE007F4DE6E3F2BB7184CDFAC5A0E5F
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......l=..(\.H(\.H(\.H!$4Hd\.H<7.I!\.H(\.H)X.H<7.I)\.H<7.I!\.H<7.I.\.H<7.I'\.H<7XH)\.H<7.I)\.HRich(\.H........PE..L...-..?...........!.....0...:...............@.....i................................=.....@A............................(s..X...\.... ...............B.. _...@..$g.. Q..T...............................................L...<........................text...8/.......0.................. ..`.data....2...@.......4..............@....idata..`............<..............@..@.didat..x...........................@....rsrc........ ......................@..@.reloc..$g...@...h..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):136336
                                                    Entropy (8bit):6.417048469027992
                                                    Encrypted:false
                                                    SSDEEP:3072:xqG/1ODJVjqZO/1avAHGVOBwD+S/M19oWUrTf5+ec+3uzAL:9/1OtVj+Amb+SL5n
                                                    MD5:873692EF0C70675F179C190CDC45CB09
                                                    SHA1:CF661969D1AC23463261C48D975F1636EB5F995B
                                                    SHA-256:552750680F4748906D37A0CF0A9F33E6E5C20DF24245A7AD7E752F87830E3E2B
                                                    SHA-512:5D3826032C5181CEB3C072502F7FF09EA99F31AD7634CEB31FA47017176396754FBE009C93C42552590C19C0A41170D586A7C2DA95325AE4C43194578F74ACA5
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ee..$..$..$..O..$..\..$..$..G&..O..$..O..$..O..$..O..$..O..$..Rich.$..................PE..L......*...........!.........F......ps............PM.........................0.......3....@E...............................d...T........................&...........(..T...............................................`....... ....................text...S........................... ..`.data...............................@....idata..............................@..@.didat..............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):136336
                                                    Entropy (8bit):6.417048469027992
                                                    Encrypted:false
                                                    SSDEEP:3072:xqG/1ODJVjqZO/1avAHGVOBwD+S/M19oWUrTf5+ec+3uzAL:9/1OtVj+Amb+SL5n
                                                    MD5:873692EF0C70675F179C190CDC45CB09
                                                    SHA1:CF661969D1AC23463261C48D975F1636EB5F995B
                                                    SHA-256:552750680F4748906D37A0CF0A9F33E6E5C20DF24245A7AD7E752F87830E3E2B
                                                    SHA-512:5D3826032C5181CEB3C072502F7FF09EA99F31AD7634CEB31FA47017176396754FBE009C93C42552590C19C0A41170D586A7C2DA95325AE4C43194578F74ACA5
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ee..$..$..$..O..$..\..$..$..G&..O..$..O..$..O..$..O..$..O..$..Rich.$..................PE..L......*...........!.........F......ps............PM.........................0.......3....@E...............................d...T........................&...........(..T...............................................`....... ....................text...S........................... ..`.data...............................@....idata..............................@..@.didat..............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1699896
                                                    Entropy (8bit):6.290547513916722
                                                    Encrypted:false
                                                    SSDEEP:24576:0Na0qyFU/vb313JPCGucMBbruVALdpNQHKl3y9UfSj6HYZY8zCixcq:kFU3b3HucMBbrb/qj98deCNq
                                                    MD5:5564A98A4692BA8B2D25770FB834D5F6
                                                    SHA1:129D030D817F6B25D1FDEF2CAD33EB81DE1DEA8B
                                                    SHA-256:28AB9A0F5F50FD5398324B5EC099F5C53C6FAA701C3F6D8B0B3DA47A76C56230
                                                    SHA-512:D803E2E3425095E170910103A4470C598FD4A9A10C1217A006A6393CD1ECA06D1C628E845F6FD1071F1C92778D481F47E4E5F175005FEC2CB0A7519C90992858
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.=FizS.izS.izS.2.P.jzS.}.S.hzS.}.P./zS.}.].q{S.}.V.rzS.}.W..zS.}...hzS.}.Q.hzS.RichizS.........................PE..L..................!.........................0....(K.........................@......,.....@A............................U...............................8`.......Q..0z..p............................................................................text...%........................... ..`RT.................................. ..`PAGE....:.... ...................... ..`.data....Z...0......................@....mrdata.x#.......$..................@....00cfg...............:..............@..@.rsrc................<..............@..@.reloc...Q.......R...>..............@..B................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1699896
                                                    Entropy (8bit):6.290547513916722
                                                    Encrypted:false
                                                    SSDEEP:24576:0Na0qyFU/vb313JPCGucMBbruVALdpNQHKl3y9UfSj6HYZY8zCixcq:kFU3b3HucMBbrb/qj98deCNq
                                                    MD5:5564A98A4692BA8B2D25770FB834D5F6
                                                    SHA1:129D030D817F6B25D1FDEF2CAD33EB81DE1DEA8B
                                                    SHA-256:28AB9A0F5F50FD5398324B5EC099F5C53C6FAA701C3F6D8B0B3DA47A76C56230
                                                    SHA-512:D803E2E3425095E170910103A4470C598FD4A9A10C1217A006A6393CD1ECA06D1C628E845F6FD1071F1C92778D481F47E4E5F175005FEC2CB0A7519C90992858
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.=FizS.izS.izS.2.P.jzS.}.S.hzS.}.P./zS.}.].q{S.}.V.rzS.}.W..zS.}...hzS.}.Q.hzS.RichizS.........................PE..L..................!.........................0....(K.........................@......,.....@A............................U...............................8`.......Q..0z..p............................................................................text...%........................... ..`RT.................................. ..`PAGE....:.... ...................... ..`.data....Z...0......................@....mrdata.x#.......$..................@....00cfg...............:..............@..@.rsrc................<..............@..@.reloc...Q.......R...>..............@..B................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1679648
                                                    Entropy (8bit):5.3288490918902225
                                                    Encrypted:false
                                                    SSDEEP:24576:nB79uCigstmh6JVZ3et1NtJJBwuCx59U4IgL5pc6:JXh2LeXJBwuOTU4I56
                                                    MD5:2E8AB67DC55089DFBCBFA7710BD15B07
                                                    SHA1:159434853CE512029314C6B70070220D251A924A
                                                    SHA-256:2BCC4FD8A4D3C4033A81702E1B685860BE78D6F1A7E980F2E7593C59656F2706
                                                    SHA-512:7898B7B48685A2079BC77210464C448025E5BECB25EDDF3FB612A320B627FDB45AFF12D4913ADA98524E2C4718D74E911CE007F4DE6E3F2BB7184CDFAC5A0E5F
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......l=..(\.H(\.H(\.H!$4Hd\.H<7.I!\.H(\.H)X.H<7.I)\.H<7.I!\.H<7.I.\.H<7.I'\.H<7XH)\.H<7.I)\.HRich(\.H........PE..L...-..?...........!.....0...:...............@.....i................................=.....@A............................(s..X...\.... ...............B.. _...@..$g.. Q..T...............................................L...<........................text...8/.......0.................. ..`.data....2...@.......4..............@....idata..`............<..............@..@.didat..x...........................@....rsrc........ ......................@..@.reloc..$g...@...h..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1679648
                                                    Entropy (8bit):5.3288490918902225
                                                    Encrypted:false
                                                    SSDEEP:24576:nB79uCigstmh6JVZ3et1NtJJBwuCx59U4IgL5pc6:JXh2LeXJBwuOTU4I56
                                                    MD5:2E8AB67DC55089DFBCBFA7710BD15B07
                                                    SHA1:159434853CE512029314C6B70070220D251A924A
                                                    SHA-256:2BCC4FD8A4D3C4033A81702E1B685860BE78D6F1A7E980F2E7593C59656F2706
                                                    SHA-512:7898B7B48685A2079BC77210464C448025E5BECB25EDDF3FB612A320B627FDB45AFF12D4913ADA98524E2C4718D74E911CE007F4DE6E3F2BB7184CDFAC5A0E5F
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......l=..(\.H(\.H(\.H!$4Hd\.H<7.I!\.H(\.H)X.H<7.I)\.H<7.I!\.H<7.I.\.H<7.I'\.H<7XH)\.H<7.I)\.HRich(\.H........PE..L...-..?...........!.....0...:...............@.....i................................=.....@A............................(s..X...\.... ...............B.. _...@..$g.. Q..T...............................................L...<........................text...8/.......0.................. ..`.data....2...@.......4..............@....idata..`............<..............@..@.didat..x...........................@....rsrc........ ......................@..@.reloc..$g...@...h..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):136336
                                                    Entropy (8bit):6.417048469027992
                                                    Encrypted:false
                                                    SSDEEP:3072:xqG/1ODJVjqZO/1avAHGVOBwD+S/M19oWUrTf5+ec+3uzAL:9/1OtVj+Amb+SL5n
                                                    MD5:873692EF0C70675F179C190CDC45CB09
                                                    SHA1:CF661969D1AC23463261C48D975F1636EB5F995B
                                                    SHA-256:552750680F4748906D37A0CF0A9F33E6E5C20DF24245A7AD7E752F87830E3E2B
                                                    SHA-512:5D3826032C5181CEB3C072502F7FF09EA99F31AD7634CEB31FA47017176396754FBE009C93C42552590C19C0A41170D586A7C2DA95325AE4C43194578F74ACA5
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ee..$..$..$..O..$..\..$..$..G&..O..$..O..$..O..$..O..$..O..$..Rich.$..................PE..L......*...........!.........F......ps............PM.........................0.......3....@E...............................d...T........................&...........(..T...............................................`....... ....................text...S........................... ..`.data...............................@....idata..............................@..@.didat..............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1699896
                                                    Entropy (8bit):6.290547513916722
                                                    Encrypted:false
                                                    SSDEEP:24576:0Na0qyFU/vb313JPCGucMBbruVALdpNQHKl3y9UfSj6HYZY8zCixcq:kFU3b3HucMBbrb/qj98deCNq
                                                    MD5:5564A98A4692BA8B2D25770FB834D5F6
                                                    SHA1:129D030D817F6B25D1FDEF2CAD33EB81DE1DEA8B
                                                    SHA-256:28AB9A0F5F50FD5398324B5EC099F5C53C6FAA701C3F6D8B0B3DA47A76C56230
                                                    SHA-512:D803E2E3425095E170910103A4470C598FD4A9A10C1217A006A6393CD1ECA06D1C628E845F6FD1071F1C92778D481F47E4E5F175005FEC2CB0A7519C90992858
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.=FizS.izS.izS.2.P.jzS.}.S.hzS.}.P./zS.}.].q{S.}.V.rzS.}.W..zS.}...hzS.}.Q.hzS.RichizS.........................PE..L..................!.........................0....(K.........................@......,.....@A............................U...............................8`.......Q..0z..p............................................................................text...%........................... ..`RT.................................. ..`PAGE....:.... ...................... ..`.data....Z...0......................@....mrdata.x#.......$..................@....00cfg...............:..............@..@.rsrc................<..............@..@.reloc...Q.......R...>..............@..B................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):136336
                                                    Entropy (8bit):6.417048469027992
                                                    Encrypted:false
                                                    SSDEEP:3072:xqG/1ODJVjqZO/1avAHGVOBwD+S/M19oWUrTf5+ec+3uzAL:9/1OtVj+Amb+SL5n
                                                    MD5:873692EF0C70675F179C190CDC45CB09
                                                    SHA1:CF661969D1AC23463261C48D975F1636EB5F995B
                                                    SHA-256:552750680F4748906D37A0CF0A9F33E6E5C20DF24245A7AD7E752F87830E3E2B
                                                    SHA-512:5D3826032C5181CEB3C072502F7FF09EA99F31AD7634CEB31FA47017176396754FBE009C93C42552590C19C0A41170D586A7C2DA95325AE4C43194578F74ACA5
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ee..$..$..$..O..$..\..$..$..G&..O..$..O..$..O..$..O..$..O..$..Rich.$..................PE..L......*...........!.........F......ps............PM.........................0.......3....@E...............................d...T........................&...........(..T...............................................`....... ....................text...S........................... ..`.data...............................@....idata..............................@..@.didat..............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1679648
                                                    Entropy (8bit):5.3288490918902225
                                                    Encrypted:false
                                                    SSDEEP:24576:nB79uCigstmh6JVZ3et1NtJJBwuCx59U4IgL5pc6:JXh2LeXJBwuOTU4I56
                                                    MD5:2E8AB67DC55089DFBCBFA7710BD15B07
                                                    SHA1:159434853CE512029314C6B70070220D251A924A
                                                    SHA-256:2BCC4FD8A4D3C4033A81702E1B685860BE78D6F1A7E980F2E7593C59656F2706
                                                    SHA-512:7898B7B48685A2079BC77210464C448025E5BECB25EDDF3FB612A320B627FDB45AFF12D4913ADA98524E2C4718D74E911CE007F4DE6E3F2BB7184CDFAC5A0E5F
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......l=..(\.H(\.H(\.H!$4Hd\.H<7.I!\.H(\.H)X.H<7.I)\.H<7.I!\.H<7.I.\.H<7.I'\.H<7XH)\.H<7.I)\.HRich(\.H........PE..L...-..?...........!.....0...:...............@.....i................................=.....@A............................(s..X...\.... ...............B.. _...@..$g.. Q..T...............................................L...<........................text...8/.......0.................. ..`.data....2...@.......4..............@....idata..`............<..............@..@.didat..x...........................@....rsrc........ ......................@..@.reloc..$g...@...h..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1699896
                                                    Entropy (8bit):6.290547513916722
                                                    Encrypted:false
                                                    SSDEEP:24576:0Na0qyFU/vb313JPCGucMBbruVALdpNQHKl3y9UfSj6HYZY8zCixcq:kFU3b3HucMBbrb/qj98deCNq
                                                    MD5:5564A98A4692BA8B2D25770FB834D5F6
                                                    SHA1:129D030D817F6B25D1FDEF2CAD33EB81DE1DEA8B
                                                    SHA-256:28AB9A0F5F50FD5398324B5EC099F5C53C6FAA701C3F6D8B0B3DA47A76C56230
                                                    SHA-512:D803E2E3425095E170910103A4470C598FD4A9A10C1217A006A6393CD1ECA06D1C628E845F6FD1071F1C92778D481F47E4E5F175005FEC2CB0A7519C90992858
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.=FizS.izS.izS.2.P.jzS.}.S.hzS.}.P./zS.}.].q{S.}.V.rzS.}.W..zS.}...hzS.}.Q.hzS.RichizS.........................PE..L..................!.........................0....(K.........................@......,.....@A............................U...............................8`.......Q..0z..p............................................................................text...%........................... ..`RT.................................. ..`PAGE....:.... ...................... ..`.data....Z...0......................@....mrdata.x#.......$..................@....00cfg...............:..............@..@.rsrc................<..............@..@.reloc...Q.......R...>..............@..B................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1679648
                                                    Entropy (8bit):5.3288490918902225
                                                    Encrypted:false
                                                    SSDEEP:24576:nB79uCigstmh6JVZ3et1NtJJBwuCx59U4IgL5pc6:JXh2LeXJBwuOTU4I56
                                                    MD5:2E8AB67DC55089DFBCBFA7710BD15B07
                                                    SHA1:159434853CE512029314C6B70070220D251A924A
                                                    SHA-256:2BCC4FD8A4D3C4033A81702E1B685860BE78D6F1A7E980F2E7593C59656F2706
                                                    SHA-512:7898B7B48685A2079BC77210464C448025E5BECB25EDDF3FB612A320B627FDB45AFF12D4913ADA98524E2C4718D74E911CE007F4DE6E3F2BB7184CDFAC5A0E5F
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......l=..(\.H(\.H(\.H!$4Hd\.H<7.I!\.H(\.H)X.H<7.I)\.H<7.I!\.H<7.I.\.H<7.I'\.H<7XH)\.H<7.I)\.HRich(\.H........PE..L...-..?...........!.....0...:...............@.....i................................=.....@A............................(s..X...\.... ...............B.. _...@..$g.. Q..T...............................................L...<........................text...8/.......0.................. ..`.data....2...@.......4..............@....idata..`............<..............@..@.didat..x...........................@....rsrc........ ......................@..@.reloc..$g...@...h..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):136336
                                                    Entropy (8bit):6.417048469027992
                                                    Encrypted:false
                                                    SSDEEP:3072:xqG/1ODJVjqZO/1avAHGVOBwD+S/M19oWUrTf5+ec+3uzAL:9/1OtVj+Amb+SL5n
                                                    MD5:873692EF0C70675F179C190CDC45CB09
                                                    SHA1:CF661969D1AC23463261C48D975F1636EB5F995B
                                                    SHA-256:552750680F4748906D37A0CF0A9F33E6E5C20DF24245A7AD7E752F87830E3E2B
                                                    SHA-512:5D3826032C5181CEB3C072502F7FF09EA99F31AD7634CEB31FA47017176396754FBE009C93C42552590C19C0A41170D586A7C2DA95325AE4C43194578F74ACA5
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ee..$..$..$..O..$..\..$..$..G&..O..$..O..$..O..$..O..$..O..$..Rich.$..................PE..L......*...........!.........F......ps............PM.........................0.......3....@E...............................d...T........................&...........(..T...............................................`....... ....................text...S........................... ..`.data...............................@....idata..............................@..@.didat..............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):136336
                                                    Entropy (8bit):6.417048469027992
                                                    Encrypted:false
                                                    SSDEEP:3072:xqG/1ODJVjqZO/1avAHGVOBwD+S/M19oWUrTf5+ec+3uzAL:9/1OtVj+Amb+SL5n
                                                    MD5:873692EF0C70675F179C190CDC45CB09
                                                    SHA1:CF661969D1AC23463261C48D975F1636EB5F995B
                                                    SHA-256:552750680F4748906D37A0CF0A9F33E6E5C20DF24245A7AD7E752F87830E3E2B
                                                    SHA-512:5D3826032C5181CEB3C072502F7FF09EA99F31AD7634CEB31FA47017176396754FBE009C93C42552590C19C0A41170D586A7C2DA95325AE4C43194578F74ACA5
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ee..$..$..$..O..$..\..$..$..G&..O..$..O..$..O..$..O..$..O..$..Rich.$..................PE..L......*...........!.........F......ps............PM.........................0.......3....@E...............................d...T........................&...........(..T...............................................`....... ....................text...S........................... ..`.data...............................@....idata..............................@..@.didat..............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1699896
                                                    Entropy (8bit):6.290547513916722
                                                    Encrypted:false
                                                    SSDEEP:24576:0Na0qyFU/vb313JPCGucMBbruVALdpNQHKl3y9UfSj6HYZY8zCixcq:kFU3b3HucMBbrb/qj98deCNq
                                                    MD5:5564A98A4692BA8B2D25770FB834D5F6
                                                    SHA1:129D030D817F6B25D1FDEF2CAD33EB81DE1DEA8B
                                                    SHA-256:28AB9A0F5F50FD5398324B5EC099F5C53C6FAA701C3F6D8B0B3DA47A76C56230
                                                    SHA-512:D803E2E3425095E170910103A4470C598FD4A9A10C1217A006A6393CD1ECA06D1C628E845F6FD1071F1C92778D481F47E4E5F175005FEC2CB0A7519C90992858
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.=FizS.izS.izS.2.P.jzS.}.S.hzS.}.P./zS.}.].q{S.}.V.rzS.}.W..zS.}...hzS.}.Q.hzS.RichizS.........................PE..L..................!.........................0....(K.........................@......,.....@A............................U...............................8`.......Q..0z..p............................................................................text...%........................... ..`RT.................................. ..`PAGE....:.... ...................... ..`.data....Z...0......................@....mrdata.x#.......$..................@....00cfg...............:..............@..@.rsrc................<..............@..@.reloc...Q.......R...>..............@..B................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1679648
                                                    Entropy (8bit):5.3288490918902225
                                                    Encrypted:false
                                                    SSDEEP:24576:nB79uCigstmh6JVZ3et1NtJJBwuCx59U4IgL5pc6:JXh2LeXJBwuOTU4I56
                                                    MD5:2E8AB67DC55089DFBCBFA7710BD15B07
                                                    SHA1:159434853CE512029314C6B70070220D251A924A
                                                    SHA-256:2BCC4FD8A4D3C4033A81702E1B685860BE78D6F1A7E980F2E7593C59656F2706
                                                    SHA-512:7898B7B48685A2079BC77210464C448025E5BECB25EDDF3FB612A320B627FDB45AFF12D4913ADA98524E2C4718D74E911CE007F4DE6E3F2BB7184CDFAC5A0E5F
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......l=..(\.H(\.H(\.H!$4Hd\.H<7.I!\.H(\.H)X.H<7.I)\.H<7.I!\.H<7.I.\.H<7.I'\.H<7XH)\.H<7.I)\.HRich(\.H........PE..L...-..?...........!.....0...:...............@.....i................................=.....@A............................(s..X...\.... ...............B.. _...@..$g.. Q..T...............................................L...<........................text...8/.......0.................. ..`.data....2...@.......4..............@....idata..`............<..............@..@.didat..x...........................@....rsrc........ ......................@..@.reloc..$g...@...h..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1699896
                                                    Entropy (8bit):6.290547513916722
                                                    Encrypted:false
                                                    SSDEEP:24576:0Na0qyFU/vb313JPCGucMBbruVALdpNQHKl3y9UfSj6HYZY8zCixcq:kFU3b3HucMBbrb/qj98deCNq
                                                    MD5:5564A98A4692BA8B2D25770FB834D5F6
                                                    SHA1:129D030D817F6B25D1FDEF2CAD33EB81DE1DEA8B
                                                    SHA-256:28AB9A0F5F50FD5398324B5EC099F5C53C6FAA701C3F6D8B0B3DA47A76C56230
                                                    SHA-512:D803E2E3425095E170910103A4470C598FD4A9A10C1217A006A6393CD1ECA06D1C628E845F6FD1071F1C92778D481F47E4E5F175005FEC2CB0A7519C90992858
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.=FizS.izS.izS.2.P.jzS.}.S.hzS.}.P./zS.}.].q{S.}.V.rzS.}.W..zS.}...hzS.}.Q.hzS.RichizS.........................PE..L..................!.........................0....(K.........................@......,.....@A............................U...............................8`.......Q..0z..p............................................................................text...%........................... ..`RT.................................. ..`PAGE....:.... ...................... ..`.data....Z...0......................@....mrdata.x#.......$..................@....00cfg...............:..............@..@.rsrc................<..............@..@.reloc...Q.......R...>..............@..B................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):136336
                                                    Entropy (8bit):6.417048469027992
                                                    Encrypted:false
                                                    SSDEEP:3072:xqG/1ODJVjqZO/1avAHGVOBwD+S/M19oWUrTf5+ec+3uzAL:9/1OtVj+Amb+SL5n
                                                    MD5:873692EF0C70675F179C190CDC45CB09
                                                    SHA1:CF661969D1AC23463261C48D975F1636EB5F995B
                                                    SHA-256:552750680F4748906D37A0CF0A9F33E6E5C20DF24245A7AD7E752F87830E3E2B
                                                    SHA-512:5D3826032C5181CEB3C072502F7FF09EA99F31AD7634CEB31FA47017176396754FBE009C93C42552590C19C0A41170D586A7C2DA95325AE4C43194578F74ACA5
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ee..$..$..$..O..$..\..$..$..G&..O..$..O..$..O..$..O..$..O..$..Rich.$..................PE..L......*...........!.........F......ps............PM.........................0.......3....@E...............................d...T........................&...........(..T...............................................`....... ....................text...S........................... ..`.data...............................@....idata..............................@..@.didat..............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1679648
                                                    Entropy (8bit):5.3288490918902225
                                                    Encrypted:false
                                                    SSDEEP:24576:nB79uCigstmh6JVZ3et1NtJJBwuCx59U4IgL5pc6:JXh2LeXJBwuOTU4I56
                                                    MD5:2E8AB67DC55089DFBCBFA7710BD15B07
                                                    SHA1:159434853CE512029314C6B70070220D251A924A
                                                    SHA-256:2BCC4FD8A4D3C4033A81702E1B685860BE78D6F1A7E980F2E7593C59656F2706
                                                    SHA-512:7898B7B48685A2079BC77210464C448025E5BECB25EDDF3FB612A320B627FDB45AFF12D4913ADA98524E2C4718D74E911CE007F4DE6E3F2BB7184CDFAC5A0E5F
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......l=..(\.H(\.H(\.H!$4Hd\.H<7.I!\.H(\.H)X.H<7.I)\.H<7.I!\.H<7.I.\.H<7.I'\.H<7XH)\.H<7.I)\.HRich(\.H........PE..L...-..?...........!.....0...:...............@.....i................................=.....@A............................(s..X...\.... ...............B.. _...@..$g.. Q..T...............................................L...<........................text...8/.......0.................. ..`.data....2...@.......4..............@....idata..`............<..............@..@.didat..x...........................@....rsrc........ ......................@..@.reloc..$g...@...h..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):136336
                                                    Entropy (8bit):6.417048469027992
                                                    Encrypted:false
                                                    SSDEEP:3072:xqG/1ODJVjqZO/1avAHGVOBwD+S/M19oWUrTf5+ec+3uzAL:9/1OtVj+Amb+SL5n
                                                    MD5:873692EF0C70675F179C190CDC45CB09
                                                    SHA1:CF661969D1AC23463261C48D975F1636EB5F995B
                                                    SHA-256:552750680F4748906D37A0CF0A9F33E6E5C20DF24245A7AD7E752F87830E3E2B
                                                    SHA-512:5D3826032C5181CEB3C072502F7FF09EA99F31AD7634CEB31FA47017176396754FBE009C93C42552590C19C0A41170D586A7C2DA95325AE4C43194578F74ACA5
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ee..$..$..$..O..$..\..$..$..G&..O..$..O..$..O..$..O..$..O..$..Rich.$..................PE..L......*...........!.........F......ps............PM.........................0.......3....@E...............................d...T........................&...........(..T...............................................`....... ....................text...S........................... ..`.data...............................@....idata..............................@..@.didat..............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\loaddll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1699896
                                                    Entropy (8bit):6.290547513916722
                                                    Encrypted:false
                                                    SSDEEP:24576:0Na0qyFU/vb313JPCGucMBbruVALdpNQHKl3y9UfSj6HYZY8zCixcq:kFU3b3HucMBbrb/qj98deCNq
                                                    MD5:5564A98A4692BA8B2D25770FB834D5F6
                                                    SHA1:129D030D817F6B25D1FDEF2CAD33EB81DE1DEA8B
                                                    SHA-256:28AB9A0F5F50FD5398324B5EC099F5C53C6FAA701C3F6D8B0B3DA47A76C56230
                                                    SHA-512:D803E2E3425095E170910103A4470C598FD4A9A10C1217A006A6393CD1ECA06D1C628E845F6FD1071F1C92778D481F47E4E5F175005FEC2CB0A7519C90992858
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.=FizS.izS.izS.2.P.jzS.}.S.hzS.}.P./zS.}.].q{S.}.V.rzS.}.W..zS.}...hzS.}.Q.hzS.RichizS.........................PE..L..................!.........................0....(K.........................@......,.....@A............................U...............................8`.......Q..0z..p............................................................................text...%........................... ..`RT.................................. ..`PAGE....:.... ...................... ..`.data....Z...0......................@....mrdata.x#.......$..................@....00cfg...............:..............@..@.rsrc................<..............@..@.reloc...Q.......R...>..............@..B................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\loaddll32.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1679648
                                                    Entropy (8bit):5.3288490918902225
                                                    Encrypted:false
                                                    SSDEEP:24576:nB79uCigstmh6JVZ3et1NtJJBwuCx59U4IgL5pc6:JXh2LeXJBwuOTU4I56
                                                    MD5:2E8AB67DC55089DFBCBFA7710BD15B07
                                                    SHA1:159434853CE512029314C6B70070220D251A924A
                                                    SHA-256:2BCC4FD8A4D3C4033A81702E1B685860BE78D6F1A7E980F2E7593C59656F2706
                                                    SHA-512:7898B7B48685A2079BC77210464C448025E5BECB25EDDF3FB612A320B627FDB45AFF12D4913ADA98524E2C4718D74E911CE007F4DE6E3F2BB7184CDFAC5A0E5F
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......l=..(\.H(\.H(\.H!$4Hd\.H<7.I!\.H(\.H)X.H<7.I)\.H<7.I!\.H<7.I.\.H<7.I'\.H<7XH)\.H<7.I)\.HRich(\.H........PE..L...-..?...........!.....0...:...............@.....i................................=.....@A............................(s..X...\.... ...............B.. _...@..$g.. Q..T...............................................L...<........................text...8/.......0.................. ..`.data....2...@.......4..............@....idata..`............<..............@..@.didat..x...........................@....rsrc........ ......................@..@.reloc..$g...@...h..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\loaddll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):136336
                                                    Entropy (8bit):6.417048469027992
                                                    Encrypted:false
                                                    SSDEEP:3072:xqG/1ODJVjqZO/1avAHGVOBwD+S/M19oWUrTf5+ec+3uzAL:9/1OtVj+Amb+SL5n
                                                    MD5:873692EF0C70675F179C190CDC45CB09
                                                    SHA1:CF661969D1AC23463261C48D975F1636EB5F995B
                                                    SHA-256:552750680F4748906D37A0CF0A9F33E6E5C20DF24245A7AD7E752F87830E3E2B
                                                    SHA-512:5D3826032C5181CEB3C072502F7FF09EA99F31AD7634CEB31FA47017176396754FBE009C93C42552590C19C0A41170D586A7C2DA95325AE4C43194578F74ACA5
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ee..$..$..$..O..$..\..$..$..G&..O..$..O..$..O..$..O..$..O..$..Rich.$..................PE..L......*...........!.........F......ps............PM.........................0.......3....@E...............................d...T........................&...........(..T...............................................`....... ....................text...S........................... ..`.data...............................@....idata..............................@..@.didat..............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\loaddll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1699896
                                                    Entropy (8bit):6.290547513916722
                                                    Encrypted:false
                                                    SSDEEP:24576:0Na0qyFU/vb313JPCGucMBbruVALdpNQHKl3y9UfSj6HYZY8zCixcq:kFU3b3HucMBbrb/qj98deCNq
                                                    MD5:5564A98A4692BA8B2D25770FB834D5F6
                                                    SHA1:129D030D817F6B25D1FDEF2CAD33EB81DE1DEA8B
                                                    SHA-256:28AB9A0F5F50FD5398324B5EC099F5C53C6FAA701C3F6D8B0B3DA47A76C56230
                                                    SHA-512:D803E2E3425095E170910103A4470C598FD4A9A10C1217A006A6393CD1ECA06D1C628E845F6FD1071F1C92778D481F47E4E5F175005FEC2CB0A7519C90992858
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.=FizS.izS.izS.2.P.jzS.}.S.hzS.}.P./zS.}.].q{S.}.V.rzS.}.W..zS.}...hzS.}.Q.hzS.RichizS.........................PE..L..................!.........................0....(K.........................@......,.....@A............................U...............................8`.......Q..0z..p............................................................................text...%........................... ..`RT.................................. ..`PAGE....:.... ...................... ..`.data....Z...0......................@....mrdata.x#.......$..................@....00cfg...............:..............@..@.rsrc................<..............@..@.reloc...Q.......R...>..............@..B................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\loaddll32.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1679648
                                                    Entropy (8bit):5.3288490918902225
                                                    Encrypted:false
                                                    SSDEEP:24576:nB79uCigstmh6JVZ3et1NtJJBwuCx59U4IgL5pc6:JXh2LeXJBwuOTU4I56
                                                    MD5:2E8AB67DC55089DFBCBFA7710BD15B07
                                                    SHA1:159434853CE512029314C6B70070220D251A924A
                                                    SHA-256:2BCC4FD8A4D3C4033A81702E1B685860BE78D6F1A7E980F2E7593C59656F2706
                                                    SHA-512:7898B7B48685A2079BC77210464C448025E5BECB25EDDF3FB612A320B627FDB45AFF12D4913ADA98524E2C4718D74E911CE007F4DE6E3F2BB7184CDFAC5A0E5F
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......l=..(\.H(\.H(\.H!$4Hd\.H<7.I!\.H(\.H)X.H<7.I)\.H<7.I!\.H<7.I.\.H<7.I'\.H<7XH)\.H<7.I)\.HRich(\.H........PE..L...-..?...........!.....0...:...............@.....i................................=.....@A............................(s..X...\.... ...............B.. _...@..$g.. Q..T...............................................L...<........................text...8/.......0.................. ..`.data....2...@.......4..............@....idata..`............<..............@..@.didat..x...........................@....rsrc........ ......................@..@.reloc..$g...@...h..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\loaddll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):136336
                                                    Entropy (8bit):6.417048469027992
                                                    Encrypted:false
                                                    SSDEEP:3072:xqG/1ODJVjqZO/1avAHGVOBwD+S/M19oWUrTf5+ec+3uzAL:9/1OtVj+Amb+SL5n
                                                    MD5:873692EF0C70675F179C190CDC45CB09
                                                    SHA1:CF661969D1AC23463261C48D975F1636EB5F995B
                                                    SHA-256:552750680F4748906D37A0CF0A9F33E6E5C20DF24245A7AD7E752F87830E3E2B
                                                    SHA-512:5D3826032C5181CEB3C072502F7FF09EA99F31AD7634CEB31FA47017176396754FBE009C93C42552590C19C0A41170D586A7C2DA95325AE4C43194578F74ACA5
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ee..$..$..$..O..$..\..$..$..G&..O..$..O..$..O..$..O..$..O..$..Rich.$..................PE..L......*...........!.........F......ps............PM.........................0.......3....@E...............................d...T........................&...........(..T...............................................`....... ....................text...S........................... ..`.data...............................@....idata..............................@..@.didat..............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\loaddll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1699896
                                                    Entropy (8bit):6.290547513916722
                                                    Encrypted:false
                                                    SSDEEP:24576:0Na0qyFU/vb313JPCGucMBbruVALdpNQHKl3y9UfSj6HYZY8zCixcq:kFU3b3HucMBbrb/qj98deCNq
                                                    MD5:5564A98A4692BA8B2D25770FB834D5F6
                                                    SHA1:129D030D817F6B25D1FDEF2CAD33EB81DE1DEA8B
                                                    SHA-256:28AB9A0F5F50FD5398324B5EC099F5C53C6FAA701C3F6D8B0B3DA47A76C56230
                                                    SHA-512:D803E2E3425095E170910103A4470C598FD4A9A10C1217A006A6393CD1ECA06D1C628E845F6FD1071F1C92778D481F47E4E5F175005FEC2CB0A7519C90992858
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.=FizS.izS.izS.2.P.jzS.}.S.hzS.}.P./zS.}.].q{S.}.V.rzS.}.W..zS.}...hzS.}.Q.hzS.RichizS.........................PE..L..................!.........................0....(K.........................@......,.....@A............................U...............................8`.......Q..0z..p............................................................................text...%........................... ..`RT.................................. ..`PAGE....:.... ...................... ..`.data....Z...0......................@....mrdata.x#.......$..................@....00cfg...............:..............@..@.rsrc................<..............@..@.reloc...Q.......R...>..............@..B................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\loaddll32.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1679648
                                                    Entropy (8bit):5.3288490918902225
                                                    Encrypted:false
                                                    SSDEEP:24576:nB79uCigstmh6JVZ3et1NtJJBwuCx59U4IgL5pc6:JXh2LeXJBwuOTU4I56
                                                    MD5:2E8AB67DC55089DFBCBFA7710BD15B07
                                                    SHA1:159434853CE512029314C6B70070220D251A924A
                                                    SHA-256:2BCC4FD8A4D3C4033A81702E1B685860BE78D6F1A7E980F2E7593C59656F2706
                                                    SHA-512:7898B7B48685A2079BC77210464C448025E5BECB25EDDF3FB612A320B627FDB45AFF12D4913ADA98524E2C4718D74E911CE007F4DE6E3F2BB7184CDFAC5A0E5F
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......l=..(\.H(\.H(\.H!$4Hd\.H<7.I!\.H(\.H)X.H<7.I)\.H<7.I!\.H<7.I.\.H<7.I'\.H<7XH)\.H<7.I)\.HRich(\.H........PE..L...-..?...........!.....0...:...............@.....i................................=.....@A............................(s..X...\.... ...............B.. _...@..$g.. Q..T...............................................L...<........................text...8/.......0.................. ..`.data....2...@.......4..............@....idata..`............<..............@..@.didat..x...........................@....rsrc........ ......................@..@.reloc..$g...@...h..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\loaddll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):136336
                                                    Entropy (8bit):6.417048469027992
                                                    Encrypted:false
                                                    SSDEEP:3072:xqG/1ODJVjqZO/1avAHGVOBwD+S/M19oWUrTf5+ec+3uzAL:9/1OtVj+Amb+SL5n
                                                    MD5:873692EF0C70675F179C190CDC45CB09
                                                    SHA1:CF661969D1AC23463261C48D975F1636EB5F995B
                                                    SHA-256:552750680F4748906D37A0CF0A9F33E6E5C20DF24245A7AD7E752F87830E3E2B
                                                    SHA-512:5D3826032C5181CEB3C072502F7FF09EA99F31AD7634CEB31FA47017176396754FBE009C93C42552590C19C0A41170D586A7C2DA95325AE4C43194578F74ACA5
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ee..$..$..$..O..$..\..$..$..G&..O..$..O..$..O..$..O..$..O..$..Rich.$..................PE..L......*...........!.........F......ps............PM.........................0.......3....@E...............................d...T........................&...........(..T...............................................`....... ....................text...S........................... ..`.data...............................@....idata..............................@..@.didat..............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\loaddll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1699896
                                                    Entropy (8bit):6.290547513916722
                                                    Encrypted:false
                                                    SSDEEP:24576:0Na0qyFU/vb313JPCGucMBbruVALdpNQHKl3y9UfSj6HYZY8zCixcq:kFU3b3HucMBbrb/qj98deCNq
                                                    MD5:5564A98A4692BA8B2D25770FB834D5F6
                                                    SHA1:129D030D817F6B25D1FDEF2CAD33EB81DE1DEA8B
                                                    SHA-256:28AB9A0F5F50FD5398324B5EC099F5C53C6FAA701C3F6D8B0B3DA47A76C56230
                                                    SHA-512:D803E2E3425095E170910103A4470C598FD4A9A10C1217A006A6393CD1ECA06D1C628E845F6FD1071F1C92778D481F47E4E5F175005FEC2CB0A7519C90992858
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.=FizS.izS.izS.2.P.jzS.}.S.hzS.}.P./zS.}.].q{S.}.V.rzS.}.W..zS.}...hzS.}.Q.hzS.RichizS.........................PE..L..................!.........................0....(K.........................@......,.....@A............................U...............................8`.......Q..0z..p............................................................................text...%........................... ..`RT.................................. ..`PAGE....:.... ...................... ..`.data....Z...0......................@....mrdata.x#.......$..................@....00cfg...............:..............@..@.rsrc................<..............@..@.reloc...Q.......R...>..............@..B................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\loaddll32.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1679648
                                                    Entropy (8bit):5.3288490918902225
                                                    Encrypted:false
                                                    SSDEEP:24576:nB79uCigstmh6JVZ3et1NtJJBwuCx59U4IgL5pc6:JXh2LeXJBwuOTU4I56
                                                    MD5:2E8AB67DC55089DFBCBFA7710BD15B07
                                                    SHA1:159434853CE512029314C6B70070220D251A924A
                                                    SHA-256:2BCC4FD8A4D3C4033A81702E1B685860BE78D6F1A7E980F2E7593C59656F2706
                                                    SHA-512:7898B7B48685A2079BC77210464C448025E5BECB25EDDF3FB612A320B627FDB45AFF12D4913ADA98524E2C4718D74E911CE007F4DE6E3F2BB7184CDFAC5A0E5F
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......l=..(\.H(\.H(\.H!$4Hd\.H<7.I!\.H(\.H)X.H<7.I)\.H<7.I!\.H<7.I.\.H<7.I'\.H<7XH)\.H<7.I)\.HRich(\.H........PE..L...-..?...........!.....0...:...............@.....i................................=.....@A............................(s..X...\.... ...............B.. _...@..$g.. Q..T...............................................L...<........................text...8/.......0.................. ..`.data....2...@.......4..............@....idata..`............<..............@..@.didat..x...........................@....rsrc........ ......................@..@.reloc..$g...@...h..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\loaddll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):136336
                                                    Entropy (8bit):6.417048469027992
                                                    Encrypted:false
                                                    SSDEEP:3072:xqG/1ODJVjqZO/1avAHGVOBwD+S/M19oWUrTf5+ec+3uzAL:9/1OtVj+Amb+SL5n
                                                    MD5:873692EF0C70675F179C190CDC45CB09
                                                    SHA1:CF661969D1AC23463261C48D975F1636EB5F995B
                                                    SHA-256:552750680F4748906D37A0CF0A9F33E6E5C20DF24245A7AD7E752F87830E3E2B
                                                    SHA-512:5D3826032C5181CEB3C072502F7FF09EA99F31AD7634CEB31FA47017176396754FBE009C93C42552590C19C0A41170D586A7C2DA95325AE4C43194578F74ACA5
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ee..$..$..$..O..$..\..$..$..G&..O..$..O..$..O..$..O..$..O..$..Rich.$..................PE..L......*...........!.........F......ps............PM.........................0.......3....@E...............................d...T........................&...........(..T...............................................`....... ....................text...S........................... ..`.data...............................@....idata..............................@..@.didat..............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1699896
                                                    Entropy (8bit):6.290547513916722
                                                    Encrypted:false
                                                    SSDEEP:24576:0Na0qyFU/vb313JPCGucMBbruVALdpNQHKl3y9UfSj6HYZY8zCixcq:kFU3b3HucMBbrb/qj98deCNq
                                                    MD5:5564A98A4692BA8B2D25770FB834D5F6
                                                    SHA1:129D030D817F6B25D1FDEF2CAD33EB81DE1DEA8B
                                                    SHA-256:28AB9A0F5F50FD5398324B5EC099F5C53C6FAA701C3F6D8B0B3DA47A76C56230
                                                    SHA-512:D803E2E3425095E170910103A4470C598FD4A9A10C1217A006A6393CD1ECA06D1C628E845F6FD1071F1C92778D481F47E4E5F175005FEC2CB0A7519C90992858
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.=FizS.izS.izS.2.P.jzS.}.S.hzS.}.P./zS.}.].q{S.}.V.rzS.}.W..zS.}...hzS.}.Q.hzS.RichizS.........................PE..L..................!.........................0....(K.........................@......,.....@A............................U...............................8`.......Q..0z..p............................................................................text...%........................... ..`RT.................................. ..`PAGE....:.... ...................... ..`.data....Z...0......................@....mrdata.x#.......$..................@....00cfg...............:..............@..@.rsrc................<..............@..@.reloc...Q.......R...>..............@..B................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1679648
                                                    Entropy (8bit):5.3288490918902225
                                                    Encrypted:false
                                                    SSDEEP:24576:nB79uCigstmh6JVZ3et1NtJJBwuCx59U4IgL5pc6:JXh2LeXJBwuOTU4I56
                                                    MD5:2E8AB67DC55089DFBCBFA7710BD15B07
                                                    SHA1:159434853CE512029314C6B70070220D251A924A
                                                    SHA-256:2BCC4FD8A4D3C4033A81702E1B685860BE78D6F1A7E980F2E7593C59656F2706
                                                    SHA-512:7898B7B48685A2079BC77210464C448025E5BECB25EDDF3FB612A320B627FDB45AFF12D4913ADA98524E2C4718D74E911CE007F4DE6E3F2BB7184CDFAC5A0E5F
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......l=..(\.H(\.H(\.H!$4Hd\.H<7.I!\.H(\.H)X.H<7.I)\.H<7.I!\.H<7.I.\.H<7.I'\.H<7XH)\.H<7.I)\.HRich(\.H........PE..L...-..?...........!.....0...:...............@.....i................................=.....@A............................(s..X...\.... ...............B.. _...@..$g.. Q..T...............................................L...<........................text...8/.......0.................. ..`.data....2...@.......4..............@....idata..`............<..............@..@.didat..x...........................@....rsrc........ ......................@..@.reloc..$g...@...h..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):136336
                                                    Entropy (8bit):6.417048469027992
                                                    Encrypted:false
                                                    SSDEEP:3072:xqG/1ODJVjqZO/1avAHGVOBwD+S/M19oWUrTf5+ec+3uzAL:9/1OtVj+Amb+SL5n
                                                    MD5:873692EF0C70675F179C190CDC45CB09
                                                    SHA1:CF661969D1AC23463261C48D975F1636EB5F995B
                                                    SHA-256:552750680F4748906D37A0CF0A9F33E6E5C20DF24245A7AD7E752F87830E3E2B
                                                    SHA-512:5D3826032C5181CEB3C072502F7FF09EA99F31AD7634CEB31FA47017176396754FBE009C93C42552590C19C0A41170D586A7C2DA95325AE4C43194578F74ACA5
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ee..$..$..$..O..$..\..$..$..G&..O..$..O..$..O..$..O..$..O..$..Rich.$..................PE..L......*...........!.........F......ps............PM.........................0.......3....@E...............................d...T........................&...........(..T...............................................`....... ....................text...S........................... ..`.data...............................@....idata..............................@..@.didat..............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1699896
                                                    Entropy (8bit):6.290547513916722
                                                    Encrypted:false
                                                    SSDEEP:24576:0Na0qyFU/vb313JPCGucMBbruVALdpNQHKl3y9UfSj6HYZY8zCixcq:kFU3b3HucMBbrb/qj98deCNq
                                                    MD5:5564A98A4692BA8B2D25770FB834D5F6
                                                    SHA1:129D030D817F6B25D1FDEF2CAD33EB81DE1DEA8B
                                                    SHA-256:28AB9A0F5F50FD5398324B5EC099F5C53C6FAA701C3F6D8B0B3DA47A76C56230
                                                    SHA-512:D803E2E3425095E170910103A4470C598FD4A9A10C1217A006A6393CD1ECA06D1C628E845F6FD1071F1C92778D481F47E4E5F175005FEC2CB0A7519C90992858
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.=FizS.izS.izS.2.P.jzS.}.S.hzS.}.P./zS.}.].q{S.}.V.rzS.}.W..zS.}...hzS.}.Q.hzS.RichizS.........................PE..L..................!.........................0....(K.........................@......,.....@A............................U...............................8`.......Q..0z..p............................................................................text...%........................... ..`RT.................................. ..`PAGE....:.... ...................... ..`.data....Z...0......................@....mrdata.x#.......$..................@....00cfg...............:..............@..@.rsrc................<..............@..@.reloc...Q.......R...>..............@..B................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1679648
                                                    Entropy (8bit):5.3288490918902225
                                                    Encrypted:false
                                                    SSDEEP:24576:nB79uCigstmh6JVZ3et1NtJJBwuCx59U4IgL5pc6:JXh2LeXJBwuOTU4I56
                                                    MD5:2E8AB67DC55089DFBCBFA7710BD15B07
                                                    SHA1:159434853CE512029314C6B70070220D251A924A
                                                    SHA-256:2BCC4FD8A4D3C4033A81702E1B685860BE78D6F1A7E980F2E7593C59656F2706
                                                    SHA-512:7898B7B48685A2079BC77210464C448025E5BECB25EDDF3FB612A320B627FDB45AFF12D4913ADA98524E2C4718D74E911CE007F4DE6E3F2BB7184CDFAC5A0E5F
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......l=..(\.H(\.H(\.H!$4Hd\.H<7.I!\.H(\.H)X.H<7.I)\.H<7.I!\.H<7.I.\.H<7.I'\.H<7XH)\.H<7.I)\.HRich(\.H........PE..L...-..?...........!.....0...:...............@.....i................................=.....@A............................(s..X...\.... ...............B.. _...@..$g.. Q..T...............................................L...<........................text...8/.......0.................. ..`.data....2...@.......4..............@....idata..`............<..............@..@.didat..x...........................@....rsrc........ ......................@..@.reloc..$g...@...h..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):136336
                                                    Entropy (8bit):6.417048469027992
                                                    Encrypted:false
                                                    SSDEEP:3072:xqG/1ODJVjqZO/1avAHGVOBwD+S/M19oWUrTf5+ec+3uzAL:9/1OtVj+Amb+SL5n
                                                    MD5:873692EF0C70675F179C190CDC45CB09
                                                    SHA1:CF661969D1AC23463261C48D975F1636EB5F995B
                                                    SHA-256:552750680F4748906D37A0CF0A9F33E6E5C20DF24245A7AD7E752F87830E3E2B
                                                    SHA-512:5D3826032C5181CEB3C072502F7FF09EA99F31AD7634CEB31FA47017176396754FBE009C93C42552590C19C0A41170D586A7C2DA95325AE4C43194578F74ACA5
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ee..$..$..$..O..$..\..$..$..G&..O..$..O..$..O..$..O..$..O..$..Rich.$..................PE..L......*...........!.........F......ps............PM.........................0.......3....@E...............................d...T........................&...........(..T...............................................`....... ....................text...S........................... ..`.data...............................@....idata..............................@..@.didat..............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1699896
                                                    Entropy (8bit):6.290547513916722
                                                    Encrypted:false
                                                    SSDEEP:24576:0Na0qyFU/vb313JPCGucMBbruVALdpNQHKl3y9UfSj6HYZY8zCixcq:kFU3b3HucMBbrb/qj98deCNq
                                                    MD5:5564A98A4692BA8B2D25770FB834D5F6
                                                    SHA1:129D030D817F6B25D1FDEF2CAD33EB81DE1DEA8B
                                                    SHA-256:28AB9A0F5F50FD5398324B5EC099F5C53C6FAA701C3F6D8B0B3DA47A76C56230
                                                    SHA-512:D803E2E3425095E170910103A4470C598FD4A9A10C1217A006A6393CD1ECA06D1C628E845F6FD1071F1C92778D481F47E4E5F175005FEC2CB0A7519C90992858
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.=FizS.izS.izS.2.P.jzS.}.S.hzS.}.P./zS.}.].q{S.}.V.rzS.}.W..zS.}...hzS.}.Q.hzS.RichizS.........................PE..L..................!.........................0....(K.........................@......,.....@A............................U...............................8`.......Q..0z..p............................................................................text...%........................... ..`RT.................................. ..`PAGE....:.... ...................... ..`.data....Z...0......................@....mrdata.x#.......$..................@....00cfg...............:..............@..@.rsrc................<..............@..@.reloc...Q.......R...>..............@..B................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1679648
                                                    Entropy (8bit):5.3288490918902225
                                                    Encrypted:false
                                                    SSDEEP:24576:nB79uCigstmh6JVZ3et1NtJJBwuCx59U4IgL5pc6:JXh2LeXJBwuOTU4I56
                                                    MD5:2E8AB67DC55089DFBCBFA7710BD15B07
                                                    SHA1:159434853CE512029314C6B70070220D251A924A
                                                    SHA-256:2BCC4FD8A4D3C4033A81702E1B685860BE78D6F1A7E980F2E7593C59656F2706
                                                    SHA-512:7898B7B48685A2079BC77210464C448025E5BECB25EDDF3FB612A320B627FDB45AFF12D4913ADA98524E2C4718D74E911CE007F4DE6E3F2BB7184CDFAC5A0E5F
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......l=..(\.H(\.H(\.H!$4Hd\.H<7.I!\.H(\.H)X.H<7.I)\.H<7.I!\.H<7.I.\.H<7.I'\.H<7XH)\.H<7.I)\.HRich(\.H........PE..L...-..?...........!.....0...:...............@.....i................................=.....@A............................(s..X...\.... ...............B.. _...@..$g.. Q..T...............................................L...<........................text...8/.......0.................. ..`.data....2...@.......4..............@....idata..`............<..............@..@.didat..x...........................@....rsrc........ ......................@..@.reloc..$g...@...h..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):136336
                                                    Entropy (8bit):6.417048469027992
                                                    Encrypted:false
                                                    SSDEEP:3072:xqG/1ODJVjqZO/1avAHGVOBwD+S/M19oWUrTf5+ec+3uzAL:9/1OtVj+Amb+SL5n
                                                    MD5:873692EF0C70675F179C190CDC45CB09
                                                    SHA1:CF661969D1AC23463261C48D975F1636EB5F995B
                                                    SHA-256:552750680F4748906D37A0CF0A9F33E6E5C20DF24245A7AD7E752F87830E3E2B
                                                    SHA-512:5D3826032C5181CEB3C072502F7FF09EA99F31AD7634CEB31FA47017176396754FBE009C93C42552590C19C0A41170D586A7C2DA95325AE4C43194578F74ACA5
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ee..$..$..$..O..$..\..$..$..G&..O..$..O..$..O..$..O..$..O..$..Rich.$..................PE..L......*...........!.........F......ps............PM.........................0.......3....@E...............................d...T........................&...........(..T...............................................`....... ....................text...S........................... ..`.data...............................@....idata..............................@..@.didat..............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1699896
                                                    Entropy (8bit):6.290547513916722
                                                    Encrypted:false
                                                    SSDEEP:24576:0Na0qyFU/vb313JPCGucMBbruVALdpNQHKl3y9UfSj6HYZY8zCixcq:kFU3b3HucMBbrb/qj98deCNq
                                                    MD5:5564A98A4692BA8B2D25770FB834D5F6
                                                    SHA1:129D030D817F6B25D1FDEF2CAD33EB81DE1DEA8B
                                                    SHA-256:28AB9A0F5F50FD5398324B5EC099F5C53C6FAA701C3F6D8B0B3DA47A76C56230
                                                    SHA-512:D803E2E3425095E170910103A4470C598FD4A9A10C1217A006A6393CD1ECA06D1C628E845F6FD1071F1C92778D481F47E4E5F175005FEC2CB0A7519C90992858
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.=FizS.izS.izS.2.P.jzS.}.S.hzS.}.P./zS.}.].q{S.}.V.rzS.}.W..zS.}...hzS.}.Q.hzS.RichizS.........................PE..L..................!.........................0....(K.........................@......,.....@A............................U...............................8`.......Q..0z..p............................................................................text...%........................... ..`RT.................................. ..`PAGE....:.... ...................... ..`.data....Z...0......................@....mrdata.x#.......$..................@....00cfg...............:..............@..@.rsrc................<..............@..@.reloc...Q.......R...>..............@..B................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1679648
                                                    Entropy (8bit):5.3288490918902225
                                                    Encrypted:false
                                                    SSDEEP:24576:nB79uCigstmh6JVZ3et1NtJJBwuCx59U4IgL5pc6:JXh2LeXJBwuOTU4I56
                                                    MD5:2E8AB67DC55089DFBCBFA7710BD15B07
                                                    SHA1:159434853CE512029314C6B70070220D251A924A
                                                    SHA-256:2BCC4FD8A4D3C4033A81702E1B685860BE78D6F1A7E980F2E7593C59656F2706
                                                    SHA-512:7898B7B48685A2079BC77210464C448025E5BECB25EDDF3FB612A320B627FDB45AFF12D4913ADA98524E2C4718D74E911CE007F4DE6E3F2BB7184CDFAC5A0E5F
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......l=..(\.H(\.H(\.H!$4Hd\.H<7.I!\.H(\.H)X.H<7.I)\.H<7.I!\.H<7.I.\.H<7.I'\.H<7XH)\.H<7.I)\.HRich(\.H........PE..L...-..?...........!.....0...:...............@.....i................................=.....@A............................(s..X...\.... ...............B.. _...@..$g.. Q..T...............................................L...<........................text...8/.......0.................. ..`.data....2...@.......4..............@....idata..`............<..............@..@.didat..x...........................@....rsrc........ ......................@..@.reloc..$g...@...h..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\rundll32.exe
                                                    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):136336
                                                    Entropy (8bit):6.417048469027992
                                                    Encrypted:false
                                                    SSDEEP:3072:xqG/1ODJVjqZO/1avAHGVOBwD+S/M19oWUrTf5+ec+3uzAL:9/1OtVj+Amb+SL5n
                                                    MD5:873692EF0C70675F179C190CDC45CB09
                                                    SHA1:CF661969D1AC23463261C48D975F1636EB5F995B
                                                    SHA-256:552750680F4748906D37A0CF0A9F33E6E5C20DF24245A7AD7E752F87830E3E2B
                                                    SHA-512:5D3826032C5181CEB3C072502F7FF09EA99F31AD7634CEB31FA47017176396754FBE009C93C42552590C19C0A41170D586A7C2DA95325AE4C43194578F74ACA5
                                                    Malicious:false
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ee..$..$..$..O..$..\..$..$..G&..O..$..O..$..O..$..O..$..O..$..Rich.$..................PE..L......*...........!.........F......ps............PM.........................0.......3....@E...............................d...T........................&...........(..T...............................................`....... ....................text...S........................... ..`.data...............................@....idata..............................@..@.didat..............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                    File Type:MS Windows registry file, NT/2000 or above
                                                    Category:dropped
                                                    Size (bytes):1835008
                                                    Entropy (8bit):4.394712226851867
                                                    Encrypted:false
                                                    SSDEEP:6144:gl4fiJoH0ncNXiUjt10qCG/gaocYGBoaUMMhA2NX4WABlBuNAyOBSqa:44vFCMYQUMM6VFYSyU
                                                    MD5:A9E5BB54CD09FA5E350B9CCA7F531ACE
                                                    SHA1:AE36115F849C4FBC465E83959B00AF1491237FB8
                                                    SHA-256:7DFD5AEEA2DC4E68CE0385CA45B0BAB1A6DA56714A8938D8D17E5E5A72164F39
                                                    SHA-512:D2ED95B10BEB7006410D188C872CAFC721C98E1F2610FD68DA68FEC2834113E64C5EF238931691D00A3ED0F3D074EEFE4555A6E4714302B6C8C604D5E14B7FEB
                                                    Malicious:false
                                                    Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmr..w...................................................................................................................................................................................................................................................................................................................................................C........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):6.367387166139938
                                                    TrID:
                                                    • Win32 Dynamic Link Library (generic) (1002004/3) 94.34%
                                                    • InstallShield setup (43055/19) 4.05%
                                                    • Windows Screen Saver (13104/52) 1.23%
                                                    • Generic Win/DOS Executable (2004/3) 0.19%
                                                    • DOS Executable Generic (2002/1) 0.19%
                                                    File name:SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll
                                                    File size:1'313'056 bytes
                                                    MD5:6528055bc2fa49ae0cd65d2ffbbffc2f
                                                    SHA1:d61bd08ebe3cadc025c2855408df2ea5cf333079
                                                    SHA256:d52c8e88917ca1759d156deaeb46a64e1102a59c3617bba32f652a60afe75cf5
                                                    SHA512:ab0a07d938969b123044e684050079dc1aba5ffc6455dcb780226fd4ce310c1cf0f54a4f6f0a283ec4ad122cc95eb2e5b64ef2a21596ba4c6c5a31be55e93dc4
                                                    SSDEEP:24576:Iz+iIniPg+9qqqIlJMhmVOWitpNTc6X7HsnoIp:If9N6WiRBLMo
                                                    TLSH:BA557D13BA91C0B1D21C1935D4276BF9AB75BE09CE20CA9BE3A4FE7E7D321509923117
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Ua`.4.3.4.3.4.3.(.3.4.31(.3.4.3...3.4.3...3.4.3.+.3.4.3.+.3.4.3.4.3.6.3Z+.3.4.3.4.3.4.3u2.3.4.3M..3.4.3Rich.4.3...............
                                                    Icon Hash:9eb3c18c2ceea99a
                                                    Entrypoint:0x1006b6f9
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x10000000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                                    DLL Characteristics:
                                                    Time Stamp:0x528DA73F [Thu Nov 21 06:25:03 2013 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:dc123ecb152d3069b0532972ddf602ee
                                                    Instruction
                                                    push ebp
                                                    mov ebp, esp
                                                    push ebx
                                                    mov ebx, dword ptr [ebp+08h]
                                                    push esi
                                                    mov esi, dword ptr [ebp+0Ch]
                                                    push edi
                                                    mov edi, dword ptr [ebp+10h]
                                                    test esi, esi
                                                    jne 00007F6718C28FBBh
                                                    cmp dword ptr [100D1080h], 00000000h
                                                    jmp 00007F6718C28FD8h
                                                    cmp esi, 01h
                                                    je 00007F6718C28FB7h
                                                    cmp esi, 02h
                                                    jne 00007F6718C28FD4h
                                                    mov eax, dword ptr [100D27C8h]
                                                    test eax, eax
                                                    je 00007F6718C28FBBh
                                                    push edi
                                                    push esi
                                                    push ebx
                                                    call eax
                                                    test eax, eax
                                                    je 00007F6718C28FBEh
                                                    push edi
                                                    push esi
                                                    push ebx
                                                    call 00007F6718C28E9Ch
                                                    test eax, eax
                                                    jne 00007F6718C28FB6h
                                                    xor eax, eax
                                                    jmp 00007F6718C29000h
                                                    push edi
                                                    push esi
                                                    push ebx
                                                    call 00007F6718C27FEEh
                                                    cmp esi, 01h
                                                    mov dword ptr [ebp+0Ch], eax
                                                    jne 00007F6718C28FBEh
                                                    test eax, eax
                                                    jne 00007F6718C28FE9h
                                                    push edi
                                                    push eax
                                                    push ebx
                                                    call 00007F6718C28E78h
                                                    test esi, esi
                                                    je 00007F6718C28FB7h
                                                    cmp esi, 03h
                                                    jne 00007F6718C28FD8h
                                                    push edi
                                                    push esi
                                                    push ebx
                                                    call 00007F6718C28E67h
                                                    test eax, eax
                                                    jne 00007F6718C28FB5h
                                                    and dword ptr [ebp+0Ch], eax
                                                    cmp dword ptr [ebp+0Ch], 00000000h
                                                    je 00007F6718C28FC3h
                                                    mov eax, dword ptr [100D27C8h]
                                                    test eax, eax
                                                    je 00007F6718C28FBAh
                                                    push edi
                                                    push esi
                                                    push ebx
                                                    call eax
                                                    mov dword ptr [ebp+0Ch], eax
                                                    mov eax, dword ptr [ebp+0Ch]
                                                    pop edi
                                                    pop esi
                                                    pop ebx
                                                    pop ebp
                                                    retn 000Ch
                                                    mov eax, dword ptr [100D108Ch]
                                                    cmp eax, 01h
                                                    je 00007F6718C28FBFh
                                                    test eax, eax
                                                    jne 00007F6718C28FC0h
                                                    cmp dword ptr [100D1090h], 01h
                                                    jne 00007F6718C28FB7h
                                                    call 00007F6718C2D6FDh
                                                    push dword ptr [esp+04h]
                                                    call 00007F6718C2D72Dh
                                                    push 000000FFh
                                                    Programming Language:
                                                    • [ C ] VS98 (6.0) SP6 build 8804
                                                    • [C++] VS98 (6.0) SP6 build 8804
                                                    • [C++] VS98 (6.0) build 8168
                                                    • [EXP] VC++ 6.0 SP5 build 8804
                                                    • [LNK] VC++ 6.0 SP5 build 8804
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0xb34100x47.rdata
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xb11580x104.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xdf0000x570c.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xd70000x7e78.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x8b0000x6ac.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x894e20x8a0008d47264c2c683e9a375f3c62057421c0False0.4980875651041667data6.526750395274668IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x8b0000x284570x290009927eac2af930f8b55f2c6c4750c2e48False0.5323575647865854data5.778898832510645IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0xb40000x1e7cc0xf000f9629f30cd6549358fee64ab76259ce3False0.302685546875data4.922240172967134IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .vmp00xd30000x31610x4000c1a4cc1f0c528d330b65ed8d6ae8d69fFalse0.64239501953125data6.372819549447077IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .reloc0xd70000x7e780x8000cb3feea97b50a9cf1f8d09104219d4d4False0.63116455078125data6.574755467031048IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .rsrc0xdf0000x570c0x600038be7145636e06747f672511306d1fbeFalse0.2808024088541667data4.225479196235254IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    TEXTINCLUDE0xdfbb40xbASCII text, with no line terminatorsChineseChina1.7272727272727273
                                                    TEXTINCLUDE0xdfbc00x16dataChineseChina1.3636363636363635
                                                    TEXTINCLUDE0xdfbd80x151C source, ASCII text, with CRLF line terminatorsChineseChina0.6201780415430267
                                                    RT_CURSOR0xdfd2c0x134dataChineseChina0.5811688311688312
                                                    RT_CURSOR0xdfe600x134Targa image data - Map 64 x 65536 x 1 +32 "\001"ChineseChina0.37662337662337664
                                                    RT_CURSOR0xdff940x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"ChineseChina0.4805194805194805
                                                    RT_CURSOR0xe00c80xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"ChineseChina0.7
                                                    RT_BITMAP0xe017c0x248Device independent bitmap graphic, 64 x 15 x 4, image size 480ChineseChina0.3407534246575342
                                                    RT_BITMAP0xe03c40x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.4444444444444444
                                                    RT_BITMAP0xe05080x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.26453488372093026
                                                    RT_BITMAP0xe06600x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2616279069767442
                                                    RT_BITMAP0xe07b80x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2441860465116279
                                                    RT_BITMAP0xe09100x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.24709302325581395
                                                    RT_BITMAP0xe0a680x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2238372093023256
                                                    RT_BITMAP0xe0bc00x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.19476744186046513
                                                    RT_BITMAP0xe0d180x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.20930232558139536
                                                    RT_BITMAP0xe0e700x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.18895348837209303
                                                    RT_BITMAP0xe0fc80x5e4Device independent bitmap graphic, 70 x 39 x 4, image size 1404ChineseChina0.34615384615384615
                                                    RT_BITMAP0xe15ac0xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80ChineseChina0.44565217391304346
                                                    RT_BITMAP0xe16640x16cDevice independent bitmap graphic, 39 x 13 x 4, image size 260ChineseChina0.28296703296703296
                                                    RT_BITMAP0xe17d00x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.37962962962962965
                                                    RT_ICON0xe19140x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640ChineseChina0.26344086021505375
                                                    RT_ICON0xe1bfc0x128Device independent bitmap graphic, 16 x 32 x 4, image size 192ChineseChina0.41216216216216217
                                                    RT_ICON0xe1d240x128Device independent bitmap graphic, 16 x 32 x 4, image size 1920.3885135135135135
                                                    RT_ICON0xe1e4c0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.33198924731182794
                                                    RT_ICON0xe21340x668Device independent bitmap graphic, 48 x 96 x 4, image size 15360.22378048780487805
                                                    RT_MENU0xe279c0xcdataChineseChina1.5
                                                    RT_MENU0xe27a80x284dataChineseChina0.5
                                                    RT_DIALOG0xe2a2c0x98dataChineseChina0.7171052631578947
                                                    RT_DIALOG0xe2ac40x17adataChineseChina0.5185185185185185
                                                    RT_DIALOG0xe2c400xfadataChineseChina0.696
                                                    RT_DIALOG0xe2d3c0xeadataChineseChina0.6239316239316239
                                                    RT_DIALOG0xe2e280x8aedataChineseChina0.39603960396039606
                                                    RT_DIALOG0xe36d80xb2dataChineseChina0.7359550561797753
                                                    RT_DIALOG0xe378c0xccdataChineseChina0.7647058823529411
                                                    RT_DIALOG0xe38580xb2dataChineseChina0.6629213483146067
                                                    RT_DIALOG0xe390c0xe2dataChineseChina0.6637168141592921
                                                    RT_DIALOG0xe39f00x18cdataChineseChina0.5227272727272727
                                                    RT_STRING0xe3b7c0x50dataChineseChina0.85
                                                    RT_STRING0xe3bcc0x2cdataChineseChina0.5909090909090909
                                                    RT_STRING0xe3bf80x78dataChineseChina0.925
                                                    RT_STRING0xe3c700x1c4dataChineseChina0.8141592920353983
                                                    RT_STRING0xe3e340x12adataChineseChina0.5201342281879194
                                                    RT_STRING0xe3f600x146dataChineseChina0.6288343558282209
                                                    RT_STRING0xe40a80x40dataChineseChina0.65625
                                                    RT_STRING0xe40e80x64dataChineseChina0.73
                                                    RT_STRING0xe414c0x1d8dataChineseChina0.6758474576271186
                                                    RT_STRING0xe43240x114dataChineseChina0.6376811594202898
                                                    RT_STRING0xe44380x24dataChineseChina0.4444444444444444
                                                    RT_GROUP_CURSOR0xe445c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.25
                                                    RT_GROUP_CURSOR0xe44700x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.25
                                                    RT_GROUP_CURSOR0xe44840x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina1.0294117647058822
                                                    RT_GROUP_ICON0xe44a80x30data0.9166666666666666
                                                    RT_GROUP_ICON0xe44d80x14dataChineseChina1.2
                                                    RT_GROUP_ICON0xe44ec0x14dataChineseChina1.25
                                                    RT_VERSION0xe45000x20cdataChineseChina0.4713740458015267
                                                    DLLImport
                                                    KERNEL32.dllGetTempPathA, GlobalUnlock, SetStdHandle, IsBadCodePtr, IsBadReadPtr, CompareStringW, CompareStringA, SetUnhandledExceptionFilter, GetStringTypeW, GetStringTypeA, IsBadWritePtr, VirtualAlloc, FindClose, LCMapStringA, SetEnvironmentVariableA, VirtualFree, HeapCreate, HeapDestroy, GetEnvironmentVariableA, GetEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsW, FreeEnvironmentStringsA, GetStartupInfoA, GetFileType, GetStdHandle, SetHandleCount, GetACP, HeapSize, TerminateProcess, GetLocalTime, GetSystemTime, GetTimeZoneInformation, RaiseException, RtlUnwind, GetOEMCP, GetCPInfo, GetProcessVersion, SetErrorMode, GlobalFlags, GetCurrentThread, CreateSemaphoreA, ResumeThread, ReleaseSemaphore, EnterCriticalSection, LeaveCriticalSection, GetProfileStringA, WriteFile, ReadFile, GetLastError, WaitForMultipleObjects, CreateFileA, SetEvent, FindResourceA, LoadResource, LockResource, GetModuleFileNameA, GetCurrentThreadId, ExitProcess, GlobalSize, GlobalFree, DeleteCriticalSection, InitializeCriticalSection, lstrcatA, WinExec, lstrcpyA, FindNextFileA, GlobalReAlloc, HeapFree, HeapReAlloc, GetProcessHeap, HeapAlloc, GetFullPathNameA, FreeLibrary, LoadLibraryA, lstrlenA, GetVersionExA, WritePrivateProfileStringA, CreateThread, CreateEventA, Sleep, GlobalAlloc, FindFirstFileA, GlobalLock, GetFileTime, GetFileSize, TlsGetValue, LocalReAlloc, TlsSetValue, TlsFree, GlobalHandle, TlsAlloc, LocalAlloc, lstrcmpA, GetVersion, GlobalGetAtomNameA, GlobalAddAtomA, GlobalFindAtomA, GlobalDeleteAtom, lstrcmpiA, SetEndOfFile, UnlockFile, LockFile, FlushFileBuffers, SetFilePointer, GetCurrentProcess, DuplicateHandle, lstrcpynA, SetLastError, GetFileAttributesA, CopyFileA, GetCurrentDirectoryA, SetCurrentDirectoryA, FileTimeToLocalFileTime, FileTimeToSystemTime, LocalFree, MultiByteToWideChar, WideCharToMultiByte, InterlockedDecrement, InterlockedIncrement, GetVolumeInformationA, GetModuleHandleA, GetProcAddress, GetDiskFreeSpaceA, MulDiv, GetCommandLineA, GetTickCount, WaitForSingleObject, LCMapStringW, CloseHandle
                                                    USER32.dllOpenClipboard, GetClipboardData, CloseClipboard, SetClipboardData, EmptyClipboard, wsprintfA, GetSystemMetrics, GetCursorPos, MessageBoxA, SetWindowPos, SendMessageA, DestroyCursor, SetParent, IsWindow, PostMessageA, GetTopWindow, GetParent, GetFocus, GetClientRect, InvalidateRect, ValidateRect, UpdateWindow, EqualRect, GetWindowRect, SetForegroundWindow, DestroyMenu, IsChild, ReleaseDC, IsRectEmpty, FillRect, SystemParametersInfoA, TranslateMessage, LoadIconA, DrawFrameControl, DrawEdge, DrawFocusRect, WindowFromPoint, GetMessageA, DispatchMessageA, SetRectEmpty, RegisterClipboardFormatA, CreateIconFromResourceEx, CreateIconFromResource, DrawIconEx, CreatePopupMenu, AppendMenuA, ModifyMenuA, CreateMenu, CreateAcceleratorTableA, GetDlgCtrlID, GetSubMenu, EnableMenuItem, ClientToScreen, EnumDisplaySettingsA, LoadImageA, ShowWindow, IsWindowEnabled, TranslateAcceleratorA, GetKeyState, CopyAcceleratorTableA, PostQuitMessage, IsZoomed, GetSystemMenu, DeleteMenu, GetClassInfoA, DefWindowProcA, GetMenu, SetMenu, PeekMessageA, IsIconic, SetFocus, GetActiveWindow, GetWindow, DestroyAcceleratorTable, SetWindowRgn, GetMessagePos, ScreenToClient, ChildWindowFromPointEx, CopyRect, LoadBitmapA, WinHelpA, KillTimer, SetTimer, ReleaseCapture, GetWindowTextA, GetWindowTextLengthA, CharUpperA, GetWindowDC, BeginPaint, EndPaint, TabbedTextOutA, DrawTextA, GrayStringA, GetDlgItem, DestroyWindow, CreateDialogIndirectParamA, EndDialog, GetNextDlgTabItem, GetWindowPlacement, RegisterWindowMessageA, GetDC, GetLastActivePopup, GetMessageTime, RemovePropA, CallWindowProcA, GetPropA, UnhookWindowsHookEx, SetPropA, GetClassLongA, CallNextHookEx, SetWindowsHookExA, CreateWindowExA, GetMenuItemID, GetMenuItemCount, RegisterClassA, GetScrollPos, GetForegroundWindow, AdjustWindowRectEx, MapWindowPoints, SendDlgItemMessageA, ScrollWindowEx, IsDialogMessageA, SetWindowTextA, MoveWindow, CheckMenuItem, SetMenuItemBitmaps, GetMenuState, GetMenuCheckMarkDimensions, GetClassNameA, GetDesktopWindow, UnregisterClassA, LoadStringA, GetSysColorBrush, GetCapture, SetCapture, GetScrollRange, SetScrollRange, SetScrollPos, InflateRect, SetRect, IntersectRect, DestroyIcon, PtInRect, OffsetRect, IsWindowVisible, EnableWindow, RedrawWindow, GetWindowLongA, SetWindowLongA, GetSysColor, SetActiveWindow, SetCursorPos, LoadCursorA, SetCursor
                                                    GDI32.dllCreateRectRgnIndirect, SetStretchBltMode, GetClipRgn, CreatePolygonRgn, SelectClipRgn, DeleteObject, CreateDIBitmap, GetSystemPaletteEntries, CreatePalette, StretchBlt, SelectPalette, RealizePalette, GetDIBits, GetWindowExtEx, GetViewportOrgEx, GetWindowOrgEx, BeginPath, EndPath, PathToRegion, CreateEllipticRgn, CreateRoundRectRgn, GetTextColor, GetBkMode, GetBkColor, GetROP2, GetStretchBltMode, GetPolyFillMode, CreateCompatibleBitmap, CreateDCA, CreateBitmap, SelectObject, GetObjectA, CreatePen, PatBlt, FillRgn, CreateRectRgn, CombineRgn, CreateSolidBrush, GetStockObject, CreateFontIndirectA, EndPage, EndDoc, DeleteDC, StartDocA, StartPage, BitBlt, CreateCompatibleDC, Ellipse, Rectangle, LPtoDP, DPtoLP, GetCurrentObject, RoundRect, GetTextExtentPoint32A, GetDeviceCaps, SaveDC, RestoreDC, SetBkMode, SetPolyFillMode, SetROP2, SetTextColor, GetTextMetricsA, Escape, ExtTextOutA, TextOutA, RectVisible, PtVisible, GetViewportExtEx, ExtSelectClipRgn, LineTo, MoveToEx, ExcludeClipRect, GetClipBox, ScaleWindowExtEx, SetWindowExtEx, SetWindowOrgEx, ScaleViewportExtEx, SetViewportExtEx, OffsetViewportOrgEx, SetViewportOrgEx, SetMapMode, SetBkColor
                                                    WINMM.dllwaveOutReset, midiStreamRestart, midiStreamClose, midiOutReset, midiStreamStop, midiStreamOut, midiOutPrepareHeader, midiStreamProperty, midiStreamOpen, midiOutUnprepareHeader, waveOutOpen, waveOutGetNumDevs, waveOutClose, waveOutUnprepareHeader, waveOutPause, waveOutWrite, waveOutPrepareHeader
                                                    WINSPOOL.DRVClosePrinter, DocumentPropertiesA, OpenPrinterA
                                                    ADVAPI32.dllRegQueryValueA, RegCloseKey, RegOpenKeyExA, RegSetValueExA, RegCreateKeyA, RegCreateKeyExA
                                                    SHELL32.dllShell_NotifyIconA, ShellExecuteA
                                                    ole32.dllOleUninitialize, CLSIDFromString, OleInitialize
                                                    OLEAUT32.dllUnRegisterTypeLib, RegisterTypeLib, LoadTypeLib
                                                    COMCTL32.dllImageList_Destroy
                                                    WS2_32.dllioctlsocket, recv, getpeername, accept, inet_ntoa, WSACleanup, closesocket, WSAAsyncSelect, recvfrom
                                                    comdlg32.dllGetFileTitleA, GetSaveFileNameA, GetOpenFileNameA, ChooseColorA
                                                    Language of compilation systemCountry where language is spokenMap
                                                    ChineseChina
                                                    No network behavior found

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:2
                                                    Start time:05:34:21
                                                    Start date:25/04/2024
                                                    Path:C:\Windows\System32\loaddll32.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll"
                                                    Imagebase:0x570000
                                                    File size:126'464 bytes
                                                    MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:3
                                                    Start time:05:34:21
                                                    Start date:25/04/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff70f010000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:5
                                                    Start time:05:34:22
                                                    Start date:25/04/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll",#1
                                                    Imagebase:0xc50000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:6
                                                    Start time:05:34:22
                                                    Start date:25/04/2024
                                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll, DLL
                                                    Imagebase:0x780000
                                                    File size:61'440 bytes
                                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:7
                                                    Start time:05:34:22
                                                    Start date:25/04/2024
                                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll",#1
                                                    Imagebase:0x780000
                                                    File size:61'440 bytes
                                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:11
                                                    Start time:05:34:24
                                                    Start date:25/04/2024
                                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5884 -s 808
                                                    Imagebase:0x8d0000
                                                    File size:483'680 bytes
                                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:12
                                                    Start time:05:34:24
                                                    Start date:25/04/2024
                                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5544 -s 800
                                                    Imagebase:0x8d0000
                                                    File size:483'680 bytes
                                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:14
                                                    Start time:05:34:26
                                                    Start date:25/04/2024
                                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll", DLL
                                                    Imagebase:0x780000
                                                    File size:61'440 bytes
                                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:16
                                                    Start time:05:34:28
                                                    Start date:25/04/2024
                                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7280 -s 872
                                                    Imagebase:0x8d0000
                                                    File size:483'680 bytes
                                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:3.7%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:3.7%
                                                      Total number of Nodes:864
                                                      Total number of Limit Nodes:40
                                                      execution_graph 63225 1002b220 63237 1007b8f0 63225->63237 63227 1002b23e 63228 1002b26a 63227->63228 63241 10022950 63227->63241 63230 1002b290 63231 1002b294 63230->63231 63232 1002b2d4 GetStockObject LoadCursorA 63230->63232 63250 1007e1c9 63232->63250 63240 1007b8f6 63237->63240 63239 1007b914 63239->63227 63240->63239 63270 1006cf97 63240->63270 63243 10022971 63241->63243 63242 10022a1d 63242->63230 63243->63242 63301 10082a98 29 API calls 2 library calls 63243->63301 63245 100229cc 63302 10082b74 32 API calls 2 library calls 63245->63302 63247 100229f3 63303 10083340 39 API calls 2 library calls 63247->63303 63249 10022a07 63249->63230 63304 10084ee5 63250->63304 63255 1007e20a wsprintfA 63256 1007e224 GetClassInfoA 63255->63256 63258 1002b31c 63256->63258 63259 1007e234 63256->63259 63257 1007e1f5 wsprintfA 63257->63256 63263 1007dae5 63258->63263 63312 1007e128 32 API calls 2 library calls 63259->63312 63261 1007e26b 63261->63258 63313 10082917 RaiseException ctype 63261->63313 63264 10085112 ctype 28 API calls 63263->63264 63265 1007db2f 63264->63265 63269 1002b326 63265->63269 63339 1007da57 63265->63339 63273 1006cfa9 63270->63273 63274 1006cfa6 63273->63274 63276 1006cfb0 _rand 63273->63276 63274->63240 63276->63274 63277 1006cfd5 63276->63277 63278 1006d002 63277->63278 63282 1006d045 63277->63282 63284 1006d030 63278->63284 63295 100725d0 29 API calls 2 library calls 63278->63295 63280 1006d018 63296 10073c51 5 API calls _rand 63280->63296 63281 1006d0b4 RtlAllocateHeap 63286 1006d037 63281->63286 63283 1006d067 63282->63283 63282->63284 63298 100725d0 29 API calls 2 library calls 63283->63298 63284->63281 63284->63286 63286->63276 63288 1006d023 63297 1006d03c LeaveCriticalSection ctype 63288->63297 63289 1006d06e 63299 100746f4 6 API calls _rand 63289->63299 63292 1006d081 63300 1006d09b LeaveCriticalSection ctype 63292->63300 63294 1006d08e 63294->63284 63294->63286 63295->63280 63296->63288 63297->63284 63298->63289 63299->63292 63300->63294 63301->63245 63302->63247 63303->63249 63314 100856db 63304->63314 63307 10085112 63308 100856db ctype 21 API calls 63307->63308 63309 10085121 63308->63309 63310 1007e1e1 63309->63310 63338 1008579d 7 API calls 2 library calls 63309->63338 63310->63255 63310->63257 63312->63261 63315 10085711 TlsGetValue 63314->63315 63316 100856e4 63314->63316 63318 10085724 63315->63318 63317 100856fe 63316->63317 63335 1008529a RaiseException TlsAlloc InitializeCriticalSection ctype 63316->63335 63325 10085333 EnterCriticalSection 63317->63325 63322 1007e1d7 63318->63322 63323 10085737 63318->63323 63321 1008570f 63321->63315 63322->63307 63336 100854a2 8 API calls 2 library calls 63323->63336 63326 10085352 63325->63326 63327 1008540e _rand 63326->63327 63329 1008538c GlobalAlloc 63326->63329 63330 1008539f GlobalHandle GlobalUnlock GlobalReAlloc 63326->63330 63328 10085423 LeaveCriticalSection 63327->63328 63328->63321 63331 100853c1 63329->63331 63330->63331 63332 100853ea GlobalLock 63331->63332 63333 100853cf GlobalHandle GlobalLock LeaveCriticalSection 63331->63333 63332->63327 63337 10079bc3 RaiseException ctype 63333->63337 63335->63317 63336->63322 63338->63310 63340 100856db ctype 21 API calls 63339->63340 63341 1007da68 63340->63341 63342 1007da9b CreateWindowExA 63341->63342 63343 1007da79 GetCurrentThreadId SetWindowsHookExA 63341->63343 63346 1007daa3 63342->63346 63343->63342 63344 1007da96 63343->63344 63353 10079bc3 RaiseException ctype 63344->63353 63347 100856db ctype 21 API calls 63346->63347 63348 1007dab3 63347->63348 63349 10085112 ctype 28 API calls 63348->63349 63350 1007daba 63349->63350 63351 1007dad2 63350->63351 63352 1007dac7 UnhookWindowsHookEx 63350->63352 63351->63269 63352->63351 63354 10020f20 63355 10020f63 63354->63355 63356 10020f2b 63354->63356 63359 1003c430 RtlAllocateHeap 63356->63359 63360 1003c450 63359->63360 63362 10020f34 63359->63362 63363 10034240 129 API calls 63360->63363 63363->63362 63364 10023460 63365 1007b8f0 ctype 29 API calls 63364->63365 63366 10023482 63365->63366 63367 100234c4 63366->63367 63368 10022950 39 API calls 63366->63368 63369 100234c0 63368->63369 63369->63367 63396 10022ac0 63369->63396 63374 1007dae5 32 API calls 63375 100235f5 63374->63375 63375->63367 63405 10023790 63375->63405 63378 10023622 SendMessageA 63380 10023641 SendMessageA 63378->63380 63383 10023653 63378->63383 63380->63383 63381 1002373f SendMessageA SendMessageA 63437 10022a40 63381->63437 63383->63381 63443 1007f9d8 63383->63443 63387 1007dae5 32 API calls 63388 100236bc 63387->63388 63389 100236c0 63388->63389 63390 100236fa 63388->63390 63391 100236fc SendMessageA 63388->63391 63389->63381 63390->63391 63392 10023732 63391->63392 63393 10023729 63391->63393 63499 10025710 66 API calls 63392->63499 63498 1007ff9b EnableWindow 63393->63498 63397 10022ad3 CreateSolidBrush 63396->63397 63398 10022acb GetSysColor 63396->63398 63399 10082810 63397->63399 63398->63397 63400 10082820 63399->63400 63404 100235ba 63399->63404 63500 10082789 63400->63500 63402 10082827 63508 1007b5b6 29 API calls ctype 63402->63508 63404->63374 63406 100237c6 63405->63406 63407 100237ba 63405->63407 63515 10082568 63406->63515 63407->63406 63528 10082867 58 API calls 63407->63528 63410 10023807 63531 10081e28 60 API calls 63410->63531 63412 10023812 GetTextExtentPoint32A GetSystemMetrics 63414 10023852 63412->63414 63415 1002385c GetWindowRect 63412->63415 63532 10081e64 59 API calls 63414->63532 63419 1002389e 63415->63419 63421 10023872 63415->63421 63417 100237f0 63417->63410 63420 100237f7 63417->63420 63422 100238a2 63419->63422 63423 100238b0 GetStockObject 63419->63423 63530 10081e64 59 API calls 63420->63530 63421->63419 63426 1007ff0a SetWindowPos 63421->63426 63424 100238c1 SendMessageA 63422->63424 63423->63424 63427 100238e4 63424->63427 63428 100238ce 63424->63428 63426->63419 63522 100825da 63427->63522 63430 1007ff0a SetWindowPos 63428->63430 63429 10023803 63429->63412 63430->63427 63433 1007ff0a 63435 1007ff14 SetWindowPos 63433->63435 63436 1007ff39 63433->63436 63435->63436 63436->63378 63438 10022a50 63437->63438 63555 1007fe56 63438->63555 63442 10022a9a 63444 10085112 ctype 28 API calls 63443->63444 63446 1007f9e3 _rand 63444->63446 63445 1002368b 63445->63387 63446->63445 63447 10085112 ctype 28 API calls 63446->63447 63448 1007fa1b 63447->63448 63449 1007fa4c 63448->63449 63567 1007e128 32 API calls 2 library calls 63448->63567 63451 1007fa6d 63449->63451 63568 1007e128 32 API calls 2 library calls 63449->63568 63453 1007fa94 63451->63453 63569 1007e128 32 API calls 2 library calls 63451->63569 63455 1007faba 63453->63455 63570 1007f920 34 API calls ctype 63453->63570 63457 1007fae7 63455->63457 63571 1007f920 34 API calls ctype 63455->63571 63459 1007faf3 63457->63459 63460 1007fb10 63457->63460 63572 1007f961 6 API calls 63459->63572 63461 1007fb08 63460->63461 63462 1007fb2a 63460->63462 63461->63460 63573 1007f961 6 API calls 63461->63573 63465 1007fb47 63462->63465 63466 1007fb28 63462->63466 63468 1007fb45 63465->63468 63469 1007fb60 63465->63469 63466->63462 63574 1007f961 6 API calls 63466->63574 63468->63465 63575 1007f961 6 API calls 63468->63575 63471 1007fb7d 63469->63471 63472 1007fb5e 63469->63472 63473 1007fb7b 63471->63473 63474 1007fb9a 63471->63474 63472->63469 63576 1007f961 6 API calls 63472->63576 63473->63471 63577 1007f961 6 API calls 63473->63577 63477 1007fbb7 63474->63477 63478 1007fb98 63474->63478 63480 1007fbd4 63477->63480 63481 1007fbb5 63477->63481 63478->63474 63578 1007f961 6 API calls 63478->63578 63483 1007fbf1 63480->63483 63484 1007fbd2 63480->63484 63481->63477 63579 1007f961 6 API calls 63481->63579 63485 1007fbef 63483->63485 63486 1007fc0a 63483->63486 63484->63480 63580 1007f961 6 API calls 63484->63580 63485->63483 63581 1007f961 6 API calls 63485->63581 63489 1007fc08 63486->63489 63490 1007fc23 63486->63490 63489->63486 63582 1007f961 6 API calls 63489->63582 63492 1007fc40 63490->63492 63493 1007fc21 63490->63493 63492->63445 63495 1007fc3e 63492->63495 63493->63490 63583 1007f961 6 API calls 63493->63583 63495->63492 63584 1007f961 6 API calls 63495->63584 63497 1007fc5b 63497->63445 63498->63392 63499->63389 63501 10082793 __EH_prolog 63500->63501 63509 10085138 63501->63509 63503 10082799 ctype 63504 1007b8f0 ctype 29 API calls 63503->63504 63506 100827d7 ctype 63503->63506 63505 100827bb 63504->63505 63505->63506 63514 100814c7 29 API calls 2 library calls 63505->63514 63506->63402 63508->63404 63510 10085112 ctype 28 API calls 63509->63510 63511 1008513d 63510->63511 63512 100856db ctype 21 API calls 63511->63512 63513 1008514e 63512->63513 63513->63503 63514->63506 63516 10082572 __EH_prolog 63515->63516 63517 10082592 GetDC 63516->63517 63533 10081cd0 63517->63533 63520 100237d2 63520->63410 63529 10022b00 59 API calls 63520->63529 63523 100825e4 __EH_prolog 63522->63523 63542 10081d07 63523->63542 63528->63406 63529->63417 63530->63429 63531->63412 63532->63415 63534 10081cdc 63533->63534 63535 10081ce0 63533->63535 63534->63520 63539 10082917 RaiseException ctype 63534->63539 63540 10081c49 57 API calls 2 library calls 63535->63540 63537 10081ce7 63541 1007b5b6 29 API calls ctype 63537->63541 63540->63537 63541->63534 63543 10081d12 63542->63543 63545 10081d28 ReleaseDC 63542->63545 63553 10081c49 57 API calls 2 library calls 63543->63553 63548 10081d4e 63545->63548 63546 10081d19 63546->63545 63554 1007b606 29 API calls ctype 63546->63554 63549 10081d58 __EH_prolog 63548->63549 63550 10023605 63549->63550 63551 10081d07 ctype 57 API calls 63549->63551 63550->63378 63550->63433 63552 10081d71 DeleteDC 63551->63552 63552->63550 63553->63546 63554->63545 63556 10022a8b 63555->63556 63557 1007fe60 63555->63557 63559 1007fe25 GetWindowLongA SetWindowLongA SetWindowPos 63556->63559 63560 1007d231 63557->63560 63559->63442 63563 1007d1c8 GetWindowLongA 63560->63563 63564 1007d1e5 63563->63564 63565 1007d1e9 SetWindowLongA 63563->63565 63564->63556 63565->63564 63566 1007d1ff SetWindowPos 63565->63566 63566->63564 63567->63449 63568->63451 63569->63453 63570->63455 63571->63457 63572->63461 63573->63466 63574->63468 63575->63472 63576->63473 63577->63478 63578->63481 63579->63484 63580->63485 63581->63489 63582->63493 63583->63495 63584->63497 63585 10029160 63586 1007b8f0 ctype 29 API calls 63585->63586 63587 1002917f 63586->63587 63588 100291c1 63587->63588 63589 10022950 39 API calls 63587->63589 63590 100291bd 63589->63590 63590->63588 63591 1007f9d8 40 API calls 63590->63591 63592 10029233 63591->63592 63593 1007dae5 32 API calls 63592->63593 63594 1002926a 63593->63594 63594->63588 63595 10029285 63594->63595 63610 1007a69d SendMessageA SendMessageA 63595->63610 63598 10029292 SendMessageA 63599 100292de SendMessageA 63598->63599 63601 10029309 SendMessageA 63599->63601 63603 10029334 SendMessageA 63601->63603 63605 100293a0 63603->63605 63608 1002935c 63603->63608 63606 10022a40 3 API calls 63605->63606 63607 100293aa 63606->63607 63611 1007a707 SendMessageA SendMessageA 63608->63611 63610->63598 63611->63605 63612 100281a0 63613 1007b8f0 ctype 29 API calls 63612->63613 63614 100281c5 63613->63614 63615 10028205 63614->63615 63616 10022950 39 API calls 63614->63616 63620 10028201 63616->63620 63617 10028336 63618 1007dae5 32 API calls 63617->63618 63619 1002836f 63618->63619 63619->63615 63644 10022cc0 63619->63644 63620->63615 63620->63617 63640 10042e70 122 API calls ctype 63620->63640 63622 10028292 63622->63617 63625 10082568 58 API calls 63622->63625 63624 10028389 63626 10028391 SendMessageA 63624->63626 63627 100283bf 63624->63627 63630 100282aa 63625->63630 63628 100283c4 SendMessageA 63627->63628 63629 100283db 63627->63629 63628->63629 63641 10042f40 44 API calls ctype 63630->63641 63632 100282c2 63633 10028300 DestroyCursor 63632->63633 63634 1002830a 63632->63634 63639 100282c7 63632->63639 63633->63634 63636 10028317 63634->63636 63642 1007b919 29 API calls ctype 63634->63642 63635 100825da ctype 59 API calls 63635->63617 63643 1007b919 29 API calls ctype 63636->63643 63639->63635 63640->63622 63641->63632 63642->63636 63643->63639 63645 10022d11 GetStockObject 63644->63645 63646 10022ccb 63644->63646 63655 100827fb 63645->63655 63660 10022b00 59 API calls 63646->63660 63649 10022cd9 63649->63645 63651 10022ce0 63649->63651 63653 10022ce4 SendMessageA 63651->63653 63654 10022cf9 SendMessageA 63651->63654 63653->63624 63654->63624 63656 10082789 57 API calls 63655->63656 63657 10082802 63656->63657 63661 1008152c 63657->63661 63659 10022d1f SendMessageA 63659->63624 63660->63649 63663 10081536 __EH_prolog ctype 63661->63663 63662 10081547 ctype 63662->63659 63663->63662 63664 100815ab 63663->63664 63667 10079bc3 RaiseException ctype 63663->63667 63668 1007b5b6 29 API calls ctype 63664->63668 63668->63662 63669 1002b9a0 63670 1007b8f0 ctype 29 API calls 63669->63670 63671 1002b9c6 63670->63671 63672 1002ba06 63671->63672 63673 10022950 39 API calls 63671->63673 63674 1002ba02 63673->63674 63674->63672 63675 10022ac0 GetSysColor 63674->63675 63676 1002ba96 CreateSolidBrush 63675->63676 63677 10082810 57 API calls 63676->63677 63681 1002baac 63677->63681 63678 1002bb71 63679 1007dae5 32 API calls 63678->63679 63680 1002bbaa 63679->63680 63680->63672 63683 10022cc0 63 API calls 63680->63683 63681->63678 63700 10042e70 122 API calls ctype 63681->63700 63685 1002bbc3 63683->63685 63684 1002bacb 63684->63678 63687 10082568 58 API calls 63684->63687 63688 1002bbfb SendMessageA 63685->63688 63689 1002bbfd SendMessageA 63685->63689 63690 1002bae3 63687->63690 63688->63689 63701 10042f40 44 API calls ctype 63690->63701 63692 1002bafb 63693 1002bb41 63692->63693 63694 1002bb37 DestroyCursor 63692->63694 63699 1002baff 63692->63699 63695 1002bb4e 63693->63695 63702 1007b919 29 API calls ctype 63693->63702 63694->63693 63703 1007b919 29 API calls ctype 63695->63703 63696 100825da ctype 59 API calls 63696->63678 63699->63696 63700->63684 63701->63692 63702->63695 63703->63699 63704 1003c600 FindFirstFileA 63705 1003c61b FindClose 63704->63705 63706 1003c62e 63704->63706 63707 1003c560 63708 1003c569 63707->63708 63709 1003c58e 63707->63709 63708->63709 63710 1003c57b RtlFreeHeap 63708->63710 63710->63709 63711 1003a7a0 63738 1007d4f0 63711->63738 63713 1003a9fc 63714 1003a8f1 IsWindow 63714->63713 63716 1003a902 KiUserCallbackDispatcher IsWindow 63714->63716 63716->63713 63721 1003a917 63716->63721 63717 1003a7e9 GetParent 63743 1007d589 58 API calls ctype 63717->63743 63719 1003a972 63722 1003a9bb IsWindow 63719->63722 63720 1003a7f6 63720->63714 63744 1007ff80 IsWindowEnabled 63720->63744 63721->63719 63723 1003a967 IsWindow 63721->63723 63722->63713 63724 1003a9c8 63722->63724 63723->63713 63723->63719 63724->63713 63726 1003a9d6 GetFocus 63724->63726 63726->63713 63727 1003a9e2 IsWindow 63726->63727 63727->63713 63728 1003a9ed IsChild 63727->63728 63728->63713 63729 1003a811 63729->63714 63730 1003a887 IsWindow 63729->63730 63731 1003a8a5 GetParent 63729->63731 63733 1003a8b6 IsWindowVisible 63729->63733 63735 1003a8d7 SetActiveWindow 63729->63735 63746 1007ff80 IsWindowEnabled 63729->63746 63730->63729 63745 1007d589 58 API calls ctype 63731->63745 63733->63729 63747 1007d589 58 API calls ctype 63735->63747 63737 1003a8e7 63739 100856db ctype 21 API calls 63738->63739 63740 1007d502 63739->63740 63748 1007de21 63740->63748 63743->63720 63744->63729 63745->63729 63746->63729 63747->63737 63749 1007de50 CallWindowProcA 63748->63749 63751 1007de2e 63748->63751 63750 1003a7ae 63749->63750 63750->63713 63750->63714 63750->63717 63751->63749 63752 1007de3c DefWindowProcA 63751->63752 63752->63750 63753 10086361 63758 1008636b 63753->63758 63755 10086366 63766 1006d2af 35 API calls 63755->63766 63757 1008637f 63759 100863dd GetVersion 63758->63759 63760 1008641e GetProcessVersion 63759->63760 63761 10086430 63759->63761 63760->63761 63767 10081bc1 10 API calls 63761->63767 63763 10086437 63768 10081b7d 7 API calls 63763->63768 63765 10086441 LoadCursorA LoadCursorA 63765->63755 63766->63757 63767->63763 63768->63765 63769 10031b8d 63772 1003c060 63769->63772 63777 10035c70 63772->63777 63774 1003c08f 63775 10031b99 63774->63775 63789 10016fdf 63774->63789 63778 10035c85 63777->63778 63788 10035d3f 63777->63788 63779 10035ca0 63778->63779 63782 10035cb7 63778->63782 63793 10034270 128 API calls ctype 63779->63793 63781 10035cad 63781->63774 63783 10035ce4 63782->63783 63786 10035cfb 63782->63786 63794 10034270 128 API calls ctype 63783->63794 63785 10035cf1 63785->63774 63786->63788 63795 10034270 128 API calls ctype 63786->63795 63788->63774 63790 10017006 63789->63790 63796 100179b7 63790->63796 63792 10017679 63792->63775 63793->63781 63794->63785 63795->63788 63798 100179c0 GetPEB 63796->63798 63799 1007d635 63800 1007d647 63799->63800 63806 1007d642 63799->63806 63807 1007d5b0 63800->63807 63802 1007d650 63803 1007d66b DefWindowProcA 63802->63803 63804 1007d659 63802->63804 63803->63806 63810 1007d3be 63804->63810 63820 1007d517 63807->63820 63809 1007d5b7 ctype 63809->63802 63811 1007d3c8 __EH_prolog 63810->63811 63812 100856db ctype 21 API calls 63811->63812 63813 1007d3e0 63812->63813 63814 1007d43d 63813->63814 63836 1007d24b GetWindowRect GetWindowLongA 63813->63836 63829 1007e3eb 63814->63829 63818 1007d466 63818->63806 63821 1007d521 __EH_prolog 63820->63821 63822 10085138 ctype 28 API calls 63821->63822 63823 1007d527 ctype 63822->63823 63824 1007b8f0 ctype 29 API calls 63823->63824 63826 1007d565 ctype 63823->63826 63825 1007d549 63824->63825 63825->63826 63828 100814c7 29 API calls 2 library calls 63825->63828 63826->63809 63828->63826 63835 1007d4f0 23 API calls 63829->63835 63838 10024bf0 63829->63838 63855 10039360 63829->63855 63830 1007e40d 63831 1007d44e 63830->63831 63832 1007de21 2 API calls 63830->63832 63831->63818 63837 1007d26e 92 API calls 63831->63837 63832->63831 63835->63830 63836->63814 63837->63818 63839 10024c16 63838->63839 63840 10024ce5 63838->63840 63905 1008261c 63839->63905 63842 1007d4f0 23 API calls 63840->63842 63844 10024cec 63842->63844 63844->63830 63849 10024c9f FillRect 63851 1007de21 2 API calls 63849->63851 63850 10024c9c 63850->63849 63852 10024cc0 63851->63852 63920 1008268e 59 API calls 2 library calls 63852->63920 63854 10024cd1 63854->63830 63925 100826d0 63855->63925 63859 100393aa IsRectEmpty 63860 100393ba 63859->63860 63861 100393e8 CreateRectRgn 63859->63861 63933 10082742 59 API calls 2 library calls 63860->63933 63863 10082810 57 API calls 63861->63863 63868 10039421 63863->63868 63864 100393d1 63864->63830 63865 10039788 63866 100397eb 63865->63866 63871 10022ac0 GetSysColor 63865->63871 63946 10082867 58 API calls 63866->63946 63867 10039448 63867->63865 63935 10042f40 44 API calls ctype 63867->63935 63868->63865 63868->63867 63934 10042e70 122 API calls ctype 63868->63934 63875 100397a0 63871->63875 63872 10039804 63947 10082742 59 API calls 2 library calls 63872->63947 63874 10039487 63874->63865 63878 10039490 GetClientRect 63874->63878 63944 100828cd 58 API calls __EH_prolog 63875->63944 63877 1003981b 63877->63830 63880 100394ca 63878->63880 63901 10039556 63878->63901 63883 10039563 63880->63883 63884 10039762 63880->63884 63885 100394d1 63880->63885 63886 1003961c __ftol 63880->63886 63881 100397ad FillRgn 63945 10082867 58 API calls 63881->63945 63893 10039585 SetRect IntersectRect IsRectEmpty 63883->63893 63895 10039611 63883->63895 63938 100431a0 78 API calls ctype 63883->63938 63941 100431a0 78 API calls ctype 63884->63941 63936 100431a0 78 API calls ctype 63885->63936 63939 100431a0 78 API calls ctype 63886->63939 63891 100394e6 CreateRectRgn 63894 10082810 57 API calls 63891->63894 63893->63883 63896 10039516 CombineRgn 63894->63896 63942 10082867 58 API calls 63895->63942 63937 10082867 58 API calls 63896->63937 63900 100396e2 CreateRectRgn 63902 10082810 57 API calls 63900->63902 63943 10043500 DeleteObject 63901->63943 63903 10039712 CombineRgn 63902->63903 63940 10082867 58 API calls 63903->63940 63906 10082626 __EH_prolog 63905->63906 63907 10082646 GetWindowDC 63906->63907 63908 10081cd0 57 API calls 63907->63908 63909 10082658 63908->63909 63910 10024c21 GetClientRect GetWindowRect 63909->63910 63921 10082917 RaiseException ctype 63909->63921 63912 100823d6 ScreenToClient ScreenToClient 63910->63912 63922 1007fe0b 63912->63922 63914 10024c53 OffsetRect 63915 10082313 63914->63915 63916 1008233a 63915->63916 63917 1008232c ExcludeClipRect 63915->63917 63918 10024c7c OffsetRect 63916->63918 63919 10082341 ExcludeClipRect 63916->63919 63917->63916 63918->63849 63918->63850 63919->63918 63920->63854 63923 1007fe12 GetWindowLongA 63922->63923 63924 1007fe1e 63922->63924 63923->63914 63926 100826da __EH_prolog 63925->63926 63927 100826e6 BeginPaint 63926->63927 63928 10081cd0 57 API calls 63927->63928 63929 1008270c 63928->63929 63930 10039390 63929->63930 63948 10082917 RaiseException ctype 63929->63948 63932 10082281 GetClipBox 63930->63932 63932->63859 63933->63864 63934->63867 63935->63874 63936->63891 63937->63901 63938->63883 63939->63900 63940->63901 63941->63895 63942->63901 63943->63865 63944->63881 63945->63866 63946->63872 63947->63877 63949 10025ab0 63950 1007b8f0 ctype 29 API calls 63949->63950 63951 10025ad5 63950->63951 63952 10025b01 63951->63952 63953 10022950 39 API calls 63951->63953 63954 10025b29 63953->63954 63955 10025b2d 63954->63955 63956 10025b85 GetStockObject LoadCursorA 63954->63956 63960 10025c03 63954->63960 63957 1007e1c9 35 API calls 63956->63957 63959 10025bd1 63957->63959 63962 1007dae5 32 API calls 63959->63962 63978 1007d589 58 API calls ctype 63960->63978 63961 10025c6a 63979 1007a774 63961->63979 63964 10025be7 63962->63964 63965 10025bef 63964->63965 63966 10022cc0 63 API calls 63964->63966 63967 10025ca2 63966->63967 63968 10025ce6 SendMessageA 63967->63968 63969 10025cc6 SendMessageA 63967->63969 63970 10025d66 63968->63970 63971 10025cfa SendMessageA 63968->63971 63969->63968 63969->63969 63972 10025d23 63971->63972 63973 10025d11 SendMessageA 63971->63973 63974 10025d29 63972->63974 63975 10025d2d SendMessageA 63972->63975 63973->63972 63976 10025d58 SendMessageA 63974->63976 63975->63974 63977 10025d44 SendMessageA 63975->63977 63976->63970 63977->63976 63978->63961 63980 1007f9d8 40 API calls 63979->63980 63981 1007a781 63980->63981 63984 1007dbcb 63981->63984 63985 1007dbd7 63984->63985 63986 1007dae5 32 API calls 63985->63986 63987 1007a7a1 63986->63987 63987->63964 63988 10021cf0 63989 10021cfc 63988->63989 63991 10021d0c 63988->63991 63997 10021dc0 7 API calls 63989->63997 63993 10021d8a RtlAllocateHeap 63991->63993 63994 10021d7f GetProcessHeap 63991->63994 63995 10021d14 63991->63995 63992 10021d06 63996 10021da1 63993->63996 63994->63993 63997->63992 63998 10037650 63999 1007b8f0 ctype 29 API calls 63998->63999 64000 10037676 63999->64000 64001 1003768e 64000->64001 64060 100389d0 CreateEventA 64000->64060 64003 10022950 39 API calls 64001->64003 64004 100376a0 64001->64004 64005 100376b9 64003->64005 64005->64004 64006 100377e6 GetSystemMetrics GetSystemMetrics 64005->64006 64007 100377c0 64005->64007 64006->64007 64037 100375b0 64007->64037 64010 1007dae5 32 API calls 64011 100378d1 64010->64011 64012 100378d5 64011->64012 64013 100378eb 64011->64013 64012->64004 64014 100378dd DestroyMenu 64012->64014 64046 10037a00 GetWindowLongA SetWindowLongA SetWindowPos GetWindowLongA 64013->64046 64014->64004 64016 100378f2 GetWindowRect 64017 1003790f 64016->64017 64018 10037932 64017->64018 64061 1007fec9 MoveWindow 64017->64061 64047 10037490 64018->64047 64022 1003794c GetStockObject 64023 100827fb 57 API calls 64022->64023 64025 1003795a 64023->64025 64026 10037961 SendMessageA 64025->64026 64027 1003795e 64025->64027 64028 10037979 SetWindowPos 64026->64028 64029 1003798f 64026->64029 64027->64026 64028->64029 64030 10037996 GetSystemMenu 64029->64030 64031 100379bd 64029->64031 64063 10080fa7 57 API calls ctype 64030->64063 64064 100373d0 77 API calls 64031->64064 64034 100379a8 64034->64031 64036 100379ac DeleteMenu 64034->64036 64035 100379c3 64035->64004 64036->64031 64038 10085112 ctype 28 API calls 64037->64038 64039 100375bb GetClassInfoA 64038->64039 64041 100375e2 LoadCursorA GetStockObject 64039->64041 64042 1003763f 64039->64042 64065 1007e128 32 API calls 2 library calls 64041->64065 64042->64010 64044 10037635 64044->64042 64066 10082917 RaiseException ctype 64044->64066 64046->64016 64048 100374a4 64047->64048 64067 1003d4a0 64048->64067 64050 100374bd 64051 1003d4a0 65 API calls 64050->64051 64052 100374ca 64051->64052 64053 10037522 SendMessageA SendMessageA 64052->64053 64058 10037518 64052->64058 64083 10034a10 64052->64083 64054 1003755f 64053->64054 64055 1003755c DestroyCursor 64053->64055 64056 10037569 DestroyCursor 64054->64056 64057 1003756c 64054->64057 64055->64054 64056->64057 64057->64022 64062 10038f80 80 API calls ctype 64057->64062 64058->64053 64060->64001 64061->64018 64062->64022 64063->64034 64064->64035 64065->64044 64068 1003d57c 64067->64068 64069 1003d4c9 64067->64069 64068->64050 64069->64068 64087 10043d30 55 API calls ctype 64069->64087 64071 1003d502 64072 1003d56b 64071->64072 64073 1003d508 64071->64073 64091 10083340 39 API calls 2 library calls 64072->64091 64075 1003d520 DestroyCursor 64073->64075 64076 1003d52a 64073->64076 64075->64076 64077 1003d537 64076->64077 64088 1007b919 29 API calls ctype 64076->64088 64089 1007b919 29 API calls ctype 64077->64089 64080 1003d543 64090 10083340 39 API calls 2 library calls 64080->64090 64082 1003d557 64082->64050 64084 10034a24 GetModuleHandleA 64083->64084 64086 10034a3f 64083->64086 64092 1003dad0 LoadImageA LoadImageA 64084->64092 64086->64058 64087->64071 64088->64077 64089->64080 64090->64082 64091->64068 64092->64086 64093 1003bf90 64096 100583e0 GetProcessHeap 64093->64096 64097 10058455 GetModuleFileNameA 64096->64097 64098 10058443 OleInitialize 64096->64098 64153 1006d627 64097->64153 64098->64097 64100 10058477 64101 10058480 64100->64101 64102 1005849b 64100->64102 64103 1007bcec ctype 35 API calls 64101->64103 64164 1007bb3a 35 API calls ctype 64102->64164 64105 10058497 64103->64105 64159 1007bcec 64105->64159 64108 100584dd 64109 10058511 LoadCursorA GetStockObject 64108->64109 64110 1007e1c9 35 API calls 64109->64110 64111 10058548 64110->64111 64112 1007dae5 32 API calls 64111->64112 64113 10058559 GetCurrentThreadId 64112->64113 64114 10058597 64113->64114 64115 1005856e 64113->64115 64123 100585ec 64114->64123 64167 10022400 7 API calls 64114->64167 64165 10021f60 7 API calls 64115->64165 64118 10058582 64166 10021f60 7 API calls 64118->64166 64120 1003bf9d 64121 100585bd 64168 10022400 7 API calls 64121->64168 64125 100586b1 64123->64125 64171 10022400 7 API calls 64123->64171 64125->64120 64173 1007c141 23 API calls 64125->64173 64126 100585cb 64169 10022400 7 API calls 64126->64169 64127 10058698 64172 10022400 7 API calls 64127->64172 64131 100585db 64170 10022400 7 API calls 64131->64170 64133 100586dd 64174 10082a98 29 API calls 2 library calls 64133->64174 64135 10058720 64175 10030a90 46 API calls ctype 64135->64175 64137 10058733 64176 10082b74 32 API calls 2 library calls 64137->64176 64139 1005874c 64177 10083340 39 API calls 2 library calls 64139->64177 64141 10058758 64178 1007c17f 23 API calls 64141->64178 64143 10058760 64179 10030050 7 API calls 64143->64179 64145 1005887e 64180 10021ed0 GetProcessHeap HeapFree 64145->64180 64147 10058886 64181 100309d0 64 API calls ctype 64147->64181 64149 1005889c 64182 10021ed0 GetProcessHeap HeapFree 64149->64182 64151 100588fc 64183 10021ed0 GetProcessHeap HeapFree 64151->64183 64154 1006d644 64153->64154 64156 1006d635 64153->64156 64184 100725d0 29 API calls 2 library calls 64154->64184 64156->64100 64157 1006d64c 64185 10072631 LeaveCriticalSection 64157->64185 64160 1007bcfc lstrlenA 64159->64160 64161 1007bcf8 64159->64161 64160->64161 64186 1007bc6f 64161->64186 64163 100584ba SetCurrentDirectoryA 64163->64108 64164->64105 64165->64118 64166->64114 64167->64121 64168->64126 64169->64131 64170->64123 64171->64127 64172->64125 64173->64133 64174->64135 64175->64137 64176->64139 64177->64141 64178->64143 64179->64145 64180->64147 64181->64149 64182->64151 64183->64120 64184->64157 64185->64156 64189 1007bb86 64186->64189 64188 1007bc7d ctype 64188->64163 64190 1007bb96 64189->64190 64192 1007bbaa 64190->64192 64195 1007bae6 32 API calls ctype 64190->64195 64192->64188 64193 1007bba2 64196 1007ba1c 64193->64196 64195->64193 64197 1007ba28 64196->64197 64198 1007ba31 64196->64198 64197->64192 64199 1007ba39 64198->64199 64201 1007ba78 64198->64201 64203 1006b565 64199->64203 64202 1007b8f0 ctype 29 API calls 64201->64202 64202->64197 64210 1006dca4 64203->64210 64205 1006b56f EnterCriticalSection 64206 1006b5be LeaveCriticalSection 64205->64206 64207 1006b58d 64205->64207 64206->64197 64211 1007b3d9 29 API calls ctype 64207->64211 64209 1006b59f 64209->64206 64210->64205 64211->64209 64212 1007ff59 64213 1007ff60 ShowWindow 64212->64213 64214 1007ff6f 64212->64214 64213->64214 64215 1006b6f9 64216 1006b70c 64215->64216 64219 1006b715 64215->64219 64224 1006b73d 64216->64224 64225 1006a782 64216->64225 64219->64216 64219->64224 64258 1006b620 64219->64258 64221 1006b75d 64222 1006b620 105 API calls 64221->64222 64221->64224 64222->64224 64223 1006b620 105 API calls 64223->64221 64226 1006a7f4 64225->64226 64227 1006a78b 64225->64227 64229 1006a82a 64226->64229 64230 1006a7fa 64226->64230 64228 10084ee5 21 API calls 64227->64228 64231 1006a798 64228->64231 64246 1006a7b5 64229->64246 64308 100813c4 28 API calls ctype 64229->64308 64232 10085112 ctype 28 API calls 64230->64232 64287 10085f99 SetErrorMode SetErrorMode 64231->64287 64235 1006a7ff 64232->64235 64304 100813c4 28 API calls ctype 64235->64304 64237 1006a835 64309 100813cd 58 API calls ctype 64237->64309 64238 1006a7b0 64302 1008662a 60 API calls ctype 64238->64302 64241 1006a812 64305 100813cd 58 API calls ctype 64241->64305 64243 10085112 ctype 28 API calls 64247 1006a7bc 64243->64247 64244 1006a83c 64310 10080964 66 API calls __EH_prolog 64244->64310 64246->64221 64246->64223 64246->64224 64250 1006a7d7 64247->64250 64257 1007ba1c 31 API calls 64247->64257 64298 1001f984 64247->64298 64249 1006a819 64306 1008662a 60 API calls ctype 64249->64306 64303 1008581d EnterCriticalSection LeaveCriticalSection 64250->64303 64253 1006a7ca 64253->64238 64253->64250 64254 1006a81e 64307 10085833 7 API calls 64254->64307 64257->64253 64259 1006b6b5 64258->64259 64260 1006b62d GetVersion 64258->64260 64261 1006b6e7 64259->64261 64262 1006b6bb 64259->64262 64351 1006fdf5 HeapCreate 64260->64351 64264 1006b680 64261->64264 64373 1006f598 31 API calls ctype 64261->64373 64262->64264 64266 1006b6d6 64262->64266 64369 1006e7e9 32 API calls 64262->64369 64264->64216 64265 1006b63f 64265->64264 64363 1006f4ac 37 API calls _rand 64265->64363 64370 1006f7f4 30 API calls ctype 64266->64370 64271 1006b677 64273 1006b684 GetCommandLineA 64271->64273 64274 1006b67b 64271->64274 64272 1006b6db 64371 1006f500 35 API calls 64272->64371 64365 1006fb4e 37 API calls ctype 64273->64365 64364 1006fe52 6 API calls 64274->64364 64278 1006b6e0 64372 1006fe52 6 API calls 64278->64372 64279 1006b694 64366 1006f638 34 API calls 2 library calls 64279->64366 64282 1006b69e 64367 1006f901 49 API calls 2 library calls 64282->64367 64284 1006b6a3 64368 1006f848 48 API calls 2 library calls 64284->64368 64286 1006b6a8 64286->64264 64288 10085112 ctype 28 API calls 64287->64288 64289 10085fb0 64288->64289 64290 10085112 ctype 28 API calls 64289->64290 64291 10085fbf 64290->64291 64292 10085fe5 64291->64292 64311 10085ffc 64291->64311 64294 10085112 ctype 28 API calls 64292->64294 64295 10085fea 64294->64295 64296 1006a7ac 64295->64296 64330 10080905 30 API calls ctype 64295->64330 64296->64238 64296->64243 64299 1001f98e 64298->64299 64340 1000e9f1 64299->64340 64301 1001f9b7 64301->64253 64302->64246 64303->64246 64304->64241 64305->64249 64306->64254 64307->64246 64308->64237 64309->64244 64310->64246 64312 10085112 ctype 28 API calls 64311->64312 64313 1008600f GetModuleFileNameA 64312->64313 64314 1006d627 29 API calls 64313->64314 64315 10086041 64314->64315 64331 10086119 lstrlenA lstrcpynA 64315->64331 64317 1008605d 64318 10086073 64317->64318 64336 1006e780 29 API calls 2 library calls 64317->64336 64329 100860ad 64318->64329 64332 100816d4 64318->64332 64320 100860c5 lstrcpyA 64338 1006e780 29 API calls 2 library calls 64320->64338 64323 100860ef lstrcatA 64339 1006e780 29 API calls 2 library calls 64323->64339 64325 100860e0 64325->64323 64327 1008610d 64325->64327 64327->64292 64329->64320 64329->64325 64330->64296 64331->64317 64333 10085112 ctype 28 API calls 64332->64333 64334 100816da LoadStringA 64333->64334 64335 100816f5 64334->64335 64337 1006e780 29 API calls 2 library calls 64335->64337 64336->64318 64337->64329 64338->64325 64339->64327 64343 1001d4cc 64340->64343 64341 1000ea03 64341->64301 64346 1001d4da 64343->64346 64345 1001d4d4 64345->64341 64348 1001d502 64346->64348 64349 1001dc1d 64348->64349 64350 1001e6bf GetPEB 64348->64350 64349->64345 64350->64349 64352 1006fe15 64351->64352 64353 1006fe4b 64351->64353 64374 1006fcad 57 API calls 64352->64374 64353->64265 64355 1006fe1a 64356 1006fe24 64355->64356 64357 1006fe31 64355->64357 64375 100738b5 HeapAlloc 64356->64375 64359 1006fe4e 64357->64359 64376 100743fc 5 API calls _rand 64357->64376 64359->64265 64360 1006fe2e 64360->64359 64362 1006fe3f HeapDestroy 64360->64362 64362->64353 64363->64271 64364->64264 64365->64279 64366->64282 64367->64284 64368->64286 64369->64266 64370->64272 64371->64278 64372->64264 64373->64264 64374->64355 64375->64360 64376->64360

                                                      Control-flow Graph

                                                      APIs
                                                      • GetVersion.KERNEL32(?,?,?,10086366), ref: 100863E2
                                                      • GetProcessVersion.KERNELBASE(00000000,?,?,?,10086366), ref: 1008641F
                                                      • LoadCursorA.USER32(00000000,00007F02), ref: 1008644D
                                                      • LoadCursorA.USER32(00000000,00007F00), ref: 10086458
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CursorLoadVersion$Process
                                                      • String ID:
                                                      • API String ID: 2246821583-0
                                                      • Opcode ID: 8b3cc68ba8e6dc0b04b8436f4b1a9fa2c59e7963767d18eb6240d7e15f2654b2
                                                      • Instruction ID: 56d9e991402da88ce057ef6523fc71007cf107321722888a58ae42d56be5a25d
                                                      • Opcode Fuzzy Hash: 8b3cc68ba8e6dc0b04b8436f4b1a9fa2c59e7963767d18eb6240d7e15f2654b2
                                                      • Instruction Fuzzy Hash: F5114FB1E00B608FD724DF7A888461ABBE5FB487447514D3FE18BC6B91DB74E4408B50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bdf47bf68b895a8d7d98a4f8dcf6e200059488b429935c39955207fd19e05791
                                                      • Instruction ID: 8dd6b2a2e482122f94d93e0df4e1397155586c626e58b2420a9fecf1f34297d0
                                                      • Opcode Fuzzy Hash: bdf47bf68b895a8d7d98a4f8dcf6e200059488b429935c39955207fd19e05791
                                                      • Instruction Fuzzy Hash: AE212ABA600B41CFE320CF69E884A86F7E8EBA0765B11C92FE155C7251E771E815CB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindFirstFileA.KERNELBASE(?,?), ref: 1003C610
                                                      • FindClose.KERNEL32(00000000), ref: 1003C61C
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFileFirst
                                                      • String ID:
                                                      • API String ID: 2295610775-0
                                                      • Opcode ID: 38382ea00016c1bccd778c6d9fe1af52d8effb8c26af85a72a8fcc7c3208b902
                                                      • Instruction ID: 92ef47f22c98e7d1011a8439a40746a10edb02bc8ae6a48f69c2bfa7ddc57d94
                                                      • Opcode Fuzzy Hash: 38382ea00016c1bccd778c6d9fe1af52d8effb8c26af85a72a8fcc7c3208b902
                                                      • Instruction Fuzzy Hash: 5CD05E748005005BE7129B75CD89AAA3298BB48321FC41A29B92DC91E0FA3EC8188611
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: babb1f5255bbfecb8ec3de1741b1c98b28c1912af04a562a9333131df8c91129
                                                      • Instruction ID: e5fa7b2b61f6c8d5085ee54374d30d33245e06365616240e4825b5afad5a5623
                                                      • Opcode Fuzzy Hash: babb1f5255bbfecb8ec3de1741b1c98b28c1912af04a562a9333131df8c91129
                                                      • Instruction Fuzzy Hash: 1AC1F9B5D00219ABEF40DFE4D886BDEBBB4FF18310F104069E614BA242D775AA948B65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 99cbbd373d90fbb520547b074a51a5b0fe274a3756ec8121c6dfc2bf01df1e44
                                                      • Instruction ID: 1263581bd5a39c416ce7a3d32bca87a8561084d0c19caf819acb20f1ba3c73e3
                                                      • Opcode Fuzzy Hash: 99cbbd373d90fbb520547b074a51a5b0fe274a3756ec8121c6dfc2bf01df1e44
                                                      • Instruction Fuzzy Hash: 2BD05E75946208B7E610FA90A903BAE7A24E711350F50416AFD481E282D473AAA893D7
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 10039360-1003938b call 100826d0 2 10039390-100393b8 call 10082281 IsRectEmpty 0->2 5 100393ba-100393e7 call 10082742 2->5 6 100393e8-10039426 CreateRectRgn call 10082810 2->6 11 10039789-1003978f 6->11 12 1003942c-10039432 6->12 13 10039791-10039795 11->13 14 100397eb-10039832 call 10082867 call 10082742 11->14 15 10039434-10039438 12->15 16 1003944e-1003946e 12->16 13->14 18 10039797-100397af call 10022ac0 call 100828cd 13->18 19 1003943a-1003943c 15->19 20 1003943e 15->20 16->11 17 10039474-1003948a call 10042f40 16->17 17->11 32 10039490-100394c4 GetClientRect 17->32 42 100397b1 18->42 43 100397b4-100397e6 FillRgn call 10082867 18->43 24 10039441-10039448 call 10042e70 19->24 20->24 24->16 34 100394ca 32->34 35 1003977e-10039788 call 10043500 32->35 38 10039563-10039565 34->38 39 10039762-10039770 call 100431a0 34->39 40 100394d1-1003955e call 100431a0 CreateRectRgn call 10082810 CombineRgn call 10082867 34->40 41 1003961c-10039634 34->41 35->11 50 10039775-10039779 call 10082867 38->50 51 1003956b-10039577 38->51 39->50 40->35 46 10039636-10039647 41->46 47 10039649-1003964f 41->47 42->43 43->14 46->47 54 10039662-10039664 47->54 55 10039651-10039660 47->55 50->35 52 1003957b-1003957f 51->52 57 10039605-1003960b 52->57 58 10039585-100395da SetRect IntersectRect IsRectEmpty 52->58 60 10039666-1003966a 54->60 61 1003966c-10039693 54->61 55->54 57->52 64 10039611-10039617 57->64 62 100395f1-100395fd 58->62 63 100395dc-100395ec call 100431a0 58->63 60->61 66 100396cf-10039760 call 100431a0 CreateRectRgn call 10082810 CombineRgn call 10082867 60->66 67 10039695-10039697 61->67 68 1003969b-100396cd call 1006bca8 * 2 61->68 62->58 71 100395ff-10039601 62->71 63->62 64->50 66->35 67->68 68->66 71->57
                                                      APIs
                                                        • Part of subcall function 100826D0: __EH_prolog.LIBCMT ref: 100826D5
                                                        • Part of subcall function 100826D0: BeginPaint.USER32(?,?,?,?,10026739), ref: 100826FE
                                                        • Part of subcall function 10082281: GetClipBox.GDI32(?,?), ref: 10082288
                                                      • IsRectEmpty.USER32(?), ref: 100393AF
                                                      • CreateRectRgn.GDI32 ref: 10039411
                                                      • GetClientRect.USER32(?,?), ref: 1003949A
                                                        • Part of subcall function 10082742: __EH_prolog.LIBCMT ref: 10082747
                                                        • Part of subcall function 10082742: EndPaint.USER32(?,?,?,?,100267B3), ref: 10082764
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect$H_prologPaint$BeginClientClipCreateEmpty
                                                      • String ID:
                                                      • API String ID: 2708814891-0
                                                      • Opcode ID: 093ed300534318854b89235e245ad05813511fd1ac25431fd84f238384f9d2f4
                                                      • Instruction ID: 069b17e593daa9a7a117d8a83ae1a633172f3c1ebfa0b8d9960daf677803cf45
                                                      • Opcode Fuzzy Hash: 093ed300534318854b89235e245ad05813511fd1ac25431fd84f238384f9d2f4
                                                      • Instruction Fuzzy Hash: 3FD19E755083829FD315CF64C885A6FB7E9FBC8700F108A1DF59997281DB74E909CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Window$Parent$ActiveCallbackChildDispatcherEnabledFocusUserVisible
                                                      • String ID:
                                                      • API String ID: 416498738-0
                                                      • Opcode ID: 5c303dee78c632c7c7647358622e8f6633488fce00011eb6485a53a8de85e52e
                                                      • Instruction ID: 9898206c63a114a225deebf710e9326cf7bcce857caad309d3a107f13f37fab5
                                                      • Opcode Fuzzy Hash: 5c303dee78c632c7c7647358622e8f6633488fce00011eb6485a53a8de85e52e
                                                      • Instruction Fuzzy Hash: 5E51D076E007569FD715DF61C880A1BB7E8FF412C2F41492EFA459B250DB34E886CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(100D0D50,100D0D24,?,?,100D0D34,100D0D34,1008570F,?,?,10085121,10084A20,1008513D,100813C9,1006A835,?,1006B749), ref: 10085342
                                                      • GlobalAlloc.KERNELBASE(00002002,00000000,?,?,100D0D34,100D0D34,1008570F,?,?,10085121,10084A20,1008513D,100813C9,1006A835,?,1006B749), ref: 10085397
                                                      • GlobalHandle.KERNEL32(02EE1FC8), ref: 100853A0
                                                      • GlobalUnlock.KERNEL32(00000000,?,100D0D34,100D0D34,1008570F,?,?,10085121,10084A20,1008513D,100813C9,1006A835,?,1006B749,?,?), ref: 100853A9
                                                      • GlobalReAlloc.KERNEL32(00000000,00000000,00002002), ref: 100853BB
                                                      • GlobalHandle.KERNEL32(02EE1FC8), ref: 100853D2
                                                      • GlobalLock.KERNEL32(00000000,?,100D0D34,100D0D34,1008570F,?,?,10085121,10084A20,1008513D,100813C9,1006A835,?,1006B749,?,?), ref: 100853D9
                                                      • LeaveCriticalSection.KERNEL32(?,?,100D0D34,100D0D34,1008570F,?,?,10085121,10084A20,1008513D,100813C9,1006A835,?,1006B749,?,?), ref: 100853DF
                                                      • GlobalLock.KERNEL32(?,?,100D0D34,100D0D34,1008570F,?,?,10085121,10084A20,1008513D,100813C9,1006A835,?,1006B749,?,?), ref: 100853EE
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 10085437
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock
                                                      • String ID:
                                                      • API String ID: 2667261700-0
                                                      • Opcode ID: 8836aa51eeb1ecc96bb1803ad0b4f7b5b131ae8426aeef1a4a1b7b679546ca0a
                                                      • Instruction ID: 6c4545765da84e8ca76ca88bd290224e98aa2a8978971c85c028a3eefc4cbe91
                                                      • Opcode Fuzzy Hash: 8836aa51eeb1ecc96bb1803ad0b4f7b5b131ae8426aeef1a4a1b7b679546ca0a
                                                      • Instruction Fuzzy Hash: E031A475A007099FE721DF24DC89A2EB7E9FF44352B014A2EF852C7661E772F9448B10
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 160 10023460-10023493 call 1007b8f0 163 100234a0 160->163 164 10023495-1002349e call 10024870 160->164 166 100234a2-100234ac 163->166 164->166 168 100234ae-100234c2 call 10022950 166->168 169 100234cd-100234df 166->169 172 100234e2-1002350f 168->172 173 100234c4-100234c8 168->173 174 10023511 172->174 175 10023517-1002351b 172->175 173->169 174->175 176 10023557 175->176 177 1002351d-10023529 175->177 180 1002355d-10023563 176->180 178 10023530 177->178 179 1002352b-1002352e 177->179 181 10023536-10023537 178->181 179->178 179->181 182 10023573-10023577 180->182 183 10023565-10023566 180->183 184 10023539-1002353a 181->184 185 1002354f-10023555 181->185 188 10023581 182->188 189 10023579-1002357a 182->189 186 10023570 183->186 187 10023568-10023569 183->187 192 10023547-1002354d 184->192 193 1002353c-1002353d 184->193 185->180 186->182 187->182 194 1002356b-1002356e 187->194 190 10023587-1002358e 188->190 189->190 191 1002357c-1002357f 189->191 195 10023590-10023591 190->195 196 10023598 190->196 191->190 192->180 193->180 197 1002353f-10023545 193->197 194->182 198 10023593-10023596 195->198 199 1002359b-100235f8 call 10022ac0 CreateSolidBrush call 10082810 call 1007dae5 195->199 196->199 197->180 198->199 199->169 206 100235fe-1002360a call 10023790 199->206 209 10023622-1002363f SendMessageA 206->209 210 1002360c-1002361d call 1007ff0a 206->210 212 10023653-10023658 209->212 213 10023641-10023651 SendMessageA 209->213 210->209 214 1002365e-10023666 212->214 215 1002373f-1002376e SendMessageA * 2 call 10022a40 212->215 213->212 214->215 216 1002366c-10023673 214->216 220 10023773-1002378a 215->220 218 10023675-10023678 216->218 219 1002367f 216->219 218->219 221 1002367a-1002367d 218->221 222 10023684-100236be call 1007f9d8 call 1007dae5 219->222 221->219 221->222 227 100236c0-100236c6 222->227 228 100236c8-100236f2 222->228 229 10023739 227->229 230 100236f6-100236f8 228->230 231 100236f4 228->231 229->215 232 100236fa 230->232 233 100236fc-10023727 SendMessageA 230->233 231->230 232->233 234 10023732-10023734 call 10025710 233->234 235 10023729-1002372d call 1007ff9b 233->235 234->229 235->234
                                                      APIs
                                                      • CreateSolidBrush.GDI32(00000000), ref: 100235A8
                                                      • SendMessageA.USER32(?,000000C5,?,00000000), ref: 10023639
                                                      • SendMessageA.USER32(?,000000CC,?,00000000), ref: 10023651
                                                      • SendMessageA.USER32(?,00000465,00000000,?), ref: 1002371B
                                                      • SendMessageA.USER32(?,000000B1,?,?), ref: 10023758
                                                      • SendMessageA.USER32(?,000000B7,00000000,00000000), ref: 10023767
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$BrushCreateSolid
                                                      • String ID: EDIT$msctls_updown32
                                                      • API String ID: 943060551-1401569126
                                                      • Opcode ID: 866d4e0ae3a7c9c721d1b7952793fcf8d01803d620f4e81d60c0ed8605eb7f17
                                                      • Instruction ID: 6706c246a5efa619f7b82a21f51df8c6c83254144ed7cff15fc5791b2ac8463f
                                                      • Opcode Fuzzy Hash: 866d4e0ae3a7c9c721d1b7952793fcf8d01803d620f4e81d60c0ed8605eb7f17
                                                      • Instruction Fuzzy Hash: 4391AD71604B11AFE724DB68EC45F6BB3E9FB84780F90C91DF69AD7280DA60F8048B51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 238 10037650-10037685 call 1007b8f0 241 10037692 238->241 242 10037687-10037690 call 100389d0 238->242 244 10037694-1003769e 241->244 242->244 246 100376a0-100376a2 244->246 247 100376a7-100376bb call 10022950 244->247 248 100379c8-100379da 246->248 251 100376cd-10037702 247->251 252 100376bd-100376c8 247->252 253 10037704-10037711 251->253 254 1003774d-10037751 251->254 252->248 256 10037713-10037716 253->256 257 10037718-1003772b 253->257 258 10037756-1003775a 254->258 256->257 259 10037735-1003773b 256->259 257->259 260 1003772d 257->260 261 10037790-10037793 258->261 262 1003775c 258->262 265 10037747-1003774b 259->265 266 1003773d-10037745 259->266 260->259 263 10037795 261->263 264 1003779d-100377a0 261->264 262->261 267 10037763-1003776b 262->267 268 10037775-1003777b 262->268 269 10037785-10037789 262->269 270 1003776d 262->270 271 1003777d 262->271 263->264 273 100377a2 264->273 274 100377aa-100377b8 264->274 265->258 266->258 267->261 272 1003778c 268->272 269->272 270->268 271->269 272->261 273->274 275 100377ba-100377be 274->275 276 1003780e-1003781f 274->276 279 100377c0-100377c1 275->279 280 100377e6-1003780c GetSystemMetrics * 2 275->280 277 10037821-10037827 276->277 278 1003783b-10037845 276->278 281 10037829-10037839 277->281 282 1003784f-1003785e 277->282 283 1003784b 278->283 284 100377c3-100377c4 279->284 285 100377dc-100377e4 279->285 280->276 281->283 286 10037860-10037867 282->286 287 10037869-1003786b 282->287 283->282 284->276 288 100377c6-100377cf 284->288 285->276 286->287 289 10037881-10037892 286->289 287->289 290 1003786d-10037875 287->290 288->276 291 100377d1-100377da 288->291 293 10037894 289->293 294 10037898-100378d3 call 100375b0 call 1007dae5 289->294 290->289 292 10037877-1003787d 290->292 291->276 292->289 293->294 299 100378d5-100378db 294->299 300 100378eb-1003790d call 10037a00 GetWindowRect 294->300 301 100378e4-100378e6 299->301 302 100378dd-100378de DestroyMenu 299->302 305 10037921-1003792d call 1007fec9 300->305 306 1003790f-1003791f 300->306 301->248 302->301 307 10037932-10037933 call 10037490 305->307 306->305 306->307 310 10037938-10037943 307->310 311 10037945-10037947 call 10038f80 310->311 312 1003794c-1003795c GetStockObject call 100827fb 310->312 311->312 316 10037961-10037977 SendMessageA 312->316 317 1003795e 312->317 318 10037979-10037989 SetWindowPos 316->318 319 1003798f-10037994 316->319 317->316 318->319 320 10037996-100379aa GetSystemMenu call 10080fa7 319->320 321 100379bd-100379c6 call 100373d0 319->321 320->321 326 100379ac-100379b7 DeleteMenu 320->326 321->248 326->321
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1f3229b945a5a4a7a5addfe458981c8ea0e4e750e678b9de89d368477cda568d
                                                      • Instruction ID: e7ee783748f19fa536d23c7a4fa9ec6da67d3c08e8b5aa773031b5298e935675
                                                      • Opcode Fuzzy Hash: 1f3229b945a5a4a7a5addfe458981c8ea0e4e750e678b9de89d368477cda568d
                                                      • Instruction Fuzzy Hash: F9B17E70608741AFD366CF65C885B1BBBE5FBC4741F508A1DF59A8B290D770E841CB52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 327 10025ab0-10025ae6 call 1007b8f0 330 10025af3 327->330 331 10025ae8-10025af1 call 100264c0 327->331 333 10025af5-10025aff 330->333 331->333 335 10025b01-10025b14 333->335 336 10025b17-10025b2b call 10022950 333->336 339 10025b4c-10025b78 336->339 340 10025b2d-10025b49 336->340 341 10025c03-10025c06 339->341 342 10025b7e-10025b83 339->342 343 10025c08-10025c0b 341->343 344 10025c0d-10025c11 341->344 342->341 346 10025b85-10025be9 GetStockObject LoadCursorA call 1007e1c9 call 1007dae5 342->346 348 10025c37-10025c73 call 1007d589 call 1007a774 343->348 349 10025c13-10025c14 344->349 350 10025c29 344->350 363 10025c90-10025cc4 call 10022cc0 call 100226d0 346->363 364 10025bef-10025c00 346->364 362 10025c78-10025c7a 348->362 353 10025c21-10025c27 349->353 354 10025c16-10025c17 349->354 355 10025c2c-10025c2f 350->355 353->355 354->355 358 10025c19-10025c1f 354->358 355->348 359 10025c31 355->359 358->355 359->348 362->363 365 10025c7c-10025c8d 362->365 370 10025ce6-10025cf8 SendMessageA 363->370 371 10025cc6-10025ce4 SendMessageA 363->371 372 10025d66-10025d6e 370->372 373 10025cfa-10025d0f SendMessageA 370->373 371->370 371->371 374 10025d70-10025d74 372->374 375 10025d7a-10025d8d 372->375 376 10025d23 373->376 377 10025d11-10025d21 SendMessageA 373->377 374->375 378 10025d25-10025d27 376->378 377->378 379 10025d29-10025d2b 378->379 380 10025d2d-10025d42 SendMessageA 378->380 381 10025d58-10025d64 SendMessageA 379->381 382 10025d56 380->382 383 10025d44-10025d54 SendMessageA 380->383 381->372 382->381 383->381
                                                      APIs
                                                      • GetStockObject.GDI32(00000005), ref: 10025BB5
                                                      • LoadCursorA.USER32(00000000,00007F00), ref: 10025BC3
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CursorLoadObjectStock
                                                      • String ID:
                                                      • API String ID: 3794545487-0
                                                      • Opcode ID: 4b518e3d89cad93dd32edee5956a1a9412d7a9041ba92435d5b986e57c6279d2
                                                      • Instruction ID: f7fca1ae633531c0bdc2867b4787dbcdca93b6faa76e159c8c508b1a2ccad705
                                                      • Opcode Fuzzy Hash: 4b518e3d89cad93dd32edee5956a1a9412d7a9041ba92435d5b986e57c6279d2
                                                      • Instruction Fuzzy Hash: D581BD75644B40AFE324CB65DC81F6BB7E4FB88B11F508A2EF686C7280E675E801CB55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 692 100583e0-10058441 GetProcessHeap 693 10058455-1005847e GetModuleFileNameA call 1006d627 692->693 694 10058443-1005844b OleInitialize 692->694 697 10058480-10058499 call 1007bcec 693->697 698 1005849b-100584ae call 1007bb3a 693->698 694->693 703 100584af-10058554 call 1007bcec SetCurrentDirectoryA call 10046d80 * 3 LoadCursorA GetStockObject call 1007e1c9 call 1007dae5 697->703 698->703 715 10058559-1005856c GetCurrentThreadId 703->715 716 10058597-1005859f 715->716 717 1005856e-10058592 call 10021f60 * 2 715->717 718 10058645-1005864f 716->718 719 100585a5-100585f0 call 10022400 * 4 716->719 717->716 722 100586b1-100586b7 718->722 723 10058651-10058655 718->723 751 10058614-10058618 719->751 752 100585f2-100585fd 719->752 726 10058912-10058922 722->726 727 100586bd-1005877f call 10021cd0 call 1007c141 call 100832b7 call 10083303 call 10082a98 call 10030a90 call 10082bfc call 10082b74 call 10083340 call 1007c17f 722->727 729 10058657-10058661 723->729 730 1005867f-100586ac call 10022400 * 2 723->730 773 10058785-10058788 727->773 774 1005886c-1005890d call 10030050 call 10021ed0 call 100309d0 call 10021ed0 * 2 727->774 733 10058663-10058668 729->733 734 1005867a-1005867d 729->734 730->722 733->734 738 1005866a-10058674 733->738 734->729 734->730 738->734 751->718 753 1005861a-10058625 751->753 755 1005860f-10058612 752->755 756 100585ff-10058607 752->756 757 10058627-10058638 753->757 758 10058640-10058643 753->758 755->751 755->752 756->755 760 10058609-1005860c 756->760 757->758 761 1005863a-1005863d 757->761 758->718 758->753 760->755 761->758 776 1005878b-10058797 773->776 774->726 778 10058856-10058866 776->778 779 1005879d 776->779 778->774 778->776 781 100587a0-100587b7 call 1002f9f0 call 100300d0 779->781 791 100587f1-1005882c call 10022720 * 3 781->791 792 100587b9-100587de call 10022720 * 3 781->792 809 1005882e-10058833 791->809 810 1005884a-10058850 791->810 807 100587e0-100587e7 792->807 808 100587e9-100587ef 792->808 807->810 808->810 811 10058835-1005883c 809->811 812 1005883e 809->812 810->778 810->781 813 10058844-10058848 811->813 812->813 813->809 813->810
                                                      APIs
                                                      • GetProcessHeap.KERNEL32 ref: 10058409
                                                      • OleInitialize.OLE32(00000000), ref: 10058445
                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 10058463
                                                      • SetCurrentDirectoryA.KERNELBASE(04B75B68,?), ref: 100584BD
                                                      • LoadCursorA.USER32(00000000,00007F00), ref: 10058518
                                                      • GetStockObject.GDI32(00000005), ref: 10058539
                                                      • GetCurrentThreadId.KERNEL32 ref: 10058559
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Current$CursorDirectoryFileHeapInitializeLoadModuleNameObjectProcessStockThread
                                                      • String ID:
                                                      • API String ID: 3783217854-0
                                                      • Opcode ID: 5842282bffb8ea8e93bd797581ac44a8d6d3f906471913161c90f701377b4d99
                                                      • Instruction ID: e08755a9b9037408fb16f4e83e6af259e55b3dfd9102f66332a120c48c16a693
                                                      • Opcode Fuzzy Hash: 5842282bffb8ea8e93bd797581ac44a8d6d3f906471913161c90f701377b4d99
                                                      • Instruction Fuzzy Hash: 99E10074A00616EFDB15DFA4CC91FEEB7B5FF44300F144169E905AB292EB34AA45CBA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 814 10029160-10029190 call 1007b8f0 817 10029192-1002919b call 10029a10 814->817 818 1002919d 814->818 820 1002919f-100291a9 817->820 818->820 822 100291ca-100291dc 820->822 823 100291ab-100291bf call 10022950 820->823 826 100291c1-100291c5 823->826 827 100291df-1002920a 823->827 826->822 828 10029220-10029224 827->828 829 1002920c 827->829 833 10029226 828->833 834 10029229-10029265 call 1007f9d8 call 1007dae5 828->834 829->828 830 10029213-10029216 829->830 831 10029218-1002921b 829->831 832 1002921d 829->832 830->828 831->828 832->828 833->834 838 1002926a-1002926d 834->838 838->822 839 10029273-1002927d 838->839 840 10029281-10029283 839->840 841 1002927f 839->841 842 10029287-1002929c call 1007a69d 840->842 843 10029285 840->843 841->840 846 100292a0-100292a5 842->846 847 1002929e 842->847 843->842 848 100292a7-100292a9 846->848 849 100292ab-100292ad 846->849 847->846 850 100292b1-100292dc SendMessageA 848->850 849->850 851 100292af 849->851 852 100292e0-100292e3 850->852 853 100292de 850->853 851->850 854 100292e5-100292ea 852->854 855 100292ec-100292ee 852->855 853->852 856 100292f2-10029307 SendMessageA 854->856 855->856 857 100292f0 855->857 858 1002930b-1002930e 856->858 859 10029309 856->859 857->856 860 10029310-10029315 858->860 861 10029317-10029319 858->861 859->858 862 1002931d-10029332 SendMessageA 860->862 861->862 863 1002931b 861->863 864 10029336-10029339 862->864 865 10029334 862->865 863->862 866 10029342-10029344 864->866 867 1002933b-10029340 864->867 865->864 868 10029348-1002935a SendMessageA 866->868 869 10029346 866->869 867->868 870 100293a0-100293c0 call 10022a40 868->870 871 1002935c-1002936c 868->871 869->868 873 10029370-10029375 871->873 874 1002936e 871->874 875 10029377-10029379 873->875 876 1002937b-1002937d 873->876 874->873 878 10029381-10029385 875->878 876->878 879 1002937f 876->879 880 10029387 878->880 881 10029389-1002938b 878->881 879->878 880->881 882 10029391-10029393 881->882 883 1002938d-1002938f 881->883 884 10029397-1002939b call 1007a707 882->884 885 10029395 882->885 883->884 884->870 885->884
                                                      APIs
                                                      • SendMessageA.USER32(?,00000405,00000001,?), ref: 100292C4
                                                      • SendMessageA.USER32(?,00000417,00000000,?), ref: 100292FE
                                                      • SendMessageA.USER32(?,00000415,00000000,?), ref: 10029329
                                                      • SendMessageA.USER32(?,00000414,?,00000000), ref: 10029354
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: msctls_trackbar32
                                                      • API String ID: 3850602802-1010561917
                                                      • Opcode ID: ed4f33fb938371a43568694c917f9b93537bba43f7103158972e0ebcf1c88b94
                                                      • Instruction ID: 1ea904e369b49a4eaa652f0c9ab34ee3c6fb7b27207bc2d0ad2debcf8e46635c
                                                      • Opcode Fuzzy Hash: ed4f33fb938371a43568694c917f9b93537bba43f7103158972e0ebcf1c88b94
                                                      • Instruction Fuzzy Hash: 46719A71704A41ABE324CA68EC81B2FB3E6EBC8780F61492DF586C7781D670EC428751
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 887 1002b9a0-1002b9d5 call 1007b8f0 890 1002b9e2 887->890 891 1002b9d7-1002b9e0 call 1002c2f0 887->891 893 1002b9e4-1002b9ee 890->893 891->893 895 1002b9f0-1002ba04 call 10022950 893->895 896 1002ba0f-1002ba23 893->896 899 1002ba26-1002ba48 895->899 900 1002ba06-1002ba0a 895->900 901 1002ba4a 899->901 902 1002ba4d-1002ba50 899->902 900->896 901->902 903 1002ba52 902->903 904 1002ba55-1002ba58 902->904 903->904 905 1002ba5a 904->905 906 1002ba5d-1002ba62 904->906 905->906 907 1002ba64-1002ba67 906->907 908 1002ba69-1002ba6b 906->908 909 1002ba75-1002ba7a 907->909 910 1002ba72 908->910 911 1002ba6d-1002ba70 908->911 912 1002ba81-1002ba83 909->912 913 1002ba7c-1002ba7f 909->913 910->909 911->909 915 1002ba85-1002ba88 912->915 916 1002ba8a 912->916 914 1002ba8d-1002bab1 call 10022ac0 CreateSolidBrush call 10082810 913->914 921 1002bb71-1002bba5 call 1007dae5 914->921 922 1002bab7-1002babb 914->922 915->914 916->914 926 1002bbaa-1002bbac 921->926 923 1002bac1 922->923 924 1002babd-1002babf 922->924 927 1002bac4-1002bad3 call 10042e70 923->927 924->927 926->896 928 1002bbb2-1002bbcf call 10022cc0 926->928 927->921 933 1002bad9-1002bafd call 10082568 call 10042f40 927->933 934 1002bbd1-1002bbe3 928->934 935 1002bbe5-1002bbe8 928->935 943 1002bb1b-1002bb23 933->943 944 1002baff-1002bb0a 933->944 937 1002bbfb SendMessageA 934->937 938 1002bbea-1002bbfa 935->938 939 1002bbfd-1002bc2c SendMessageA 935->939 937->939 938->937 945 1002bb25-1002bb35 943->945 946 1002bb5d-1002bb63 943->946 947 1002bb16-1002bb19 944->947 948 1002bb0c-1002bb0f 944->948 950 1002bb41-1002bb46 945->950 951 1002bb37-1002bb3e DestroyCursor 945->951 949 1002bb68-1002bb6c call 100825da 946->949 947->949 948->947 952 1002bb11-1002bb14 948->952 949->921 953 1002bb54-1002bb5a call 1007b919 950->953 954 1002bb48-1002bb51 call 1007b919 950->954 951->950 952->949 953->946 954->953
                                                      APIs
                                                      • CreateSolidBrush.GDI32(00000000), ref: 1002BA9A
                                                      • DestroyCursor.USER32(?), ref: 1002BB38
                                                      • SendMessageA.USER32(?,000000F7,00000000,?), ref: 1002BBFB
                                                      • SendMessageA.USER32(?,000000F1,00000000,00000000), ref: 1002BC16
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$BrushCreateCursorDestroySolid
                                                      • String ID: BUTTON
                                                      • API String ID: 2198832287-3405671355
                                                      • Opcode ID: 37caa96a59bc09f23d83ab9280641cde3055aaa7d680eb242b38d2efe8fc3e4c
                                                      • Instruction ID: a83356dc72576675ecbfb8fb33c79d828da43da636fa2add4aeea5e8c96a250d
                                                      • Opcode Fuzzy Hash: 37caa96a59bc09f23d83ab9280641cde3055aaa7d680eb242b38d2efe8fc3e4c
                                                      • Instruction Fuzzy Hash: A3719CB5604B45AFD221CF64E880F6BB7E9FB84740F944A1EF69683680DB71F844CB52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1242 10023790-100237b8 1243 100237c6-100237dc call 10082568 1242->1243 1244 100237ba-100237bd 1242->1244 1249 10023807-1002380d call 10081e28 1243->1249 1250 100237de-100237e0 1243->1250 1244->1243 1245 100237bf-100237c1 call 10082867 1244->1245 1245->1243 1254 10023812-10023850 GetTextExtentPoint32A GetSystemMetrics 1249->1254 1252 100237e2-100237e4 1250->1252 1253 100237e6 1250->1253 1255 100237e9-100237f5 call 10022b00 1252->1255 1253->1255 1256 10023852-10023857 call 10081e64 1254->1256 1257 1002385c-10023870 GetWindowRect 1254->1257 1255->1249 1263 100237f7-10023805 call 10081e64 1255->1263 1256->1257 1261 10023872-1002387e 1257->1261 1262 1002389e-100238a0 1257->1262 1261->1262 1264 10023880-10023899 call 1007ff0a 1261->1264 1265 100238a2-100238ae 1262->1265 1266 100238b0-100238c0 GetStockObject 1262->1266 1263->1254 1264->1262 1267 100238c1-100238cc SendMessageA 1265->1267 1266->1267 1270 100238e4-10023907 call 100825da 1267->1270 1271 100238ce-100238df call 1007ff0a 1267->1271 1271->1270
                                                      APIs
                                                      • GetTextExtentPoint32A.GDI32(?,100B7D80,?,?), ref: 10023831
                                                      • GetSystemMetrics.USER32(0000002E), ref: 10023845
                                                      • GetWindowRect.USER32(?,?), ref: 10023865
                                                      • GetStockObject.GDI32(00000011), ref: 100238B2
                                                      • SendMessageA.USER32(?,00000030,00000000,00000001), ref: 100238C1
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ExtentMessageMetricsObjectPoint32RectSendStockSystemTextWindow
                                                      • String ID:
                                                      • API String ID: 3316701254-0
                                                      • Opcode ID: 364e1dc01b0a2c38e3fcdd93737b77c0d089be7a124f287cfab3c723d5db2d7f
                                                      • Instruction ID: 110767d5d6e3411654c162fdea3a834bb3d4c911c8ddf763e913fd1596e4cc7e
                                                      • Opcode Fuzzy Hash: 364e1dc01b0a2c38e3fcdd93737b77c0d089be7a124f287cfab3c723d5db2d7f
                                                      • Instruction Fuzzy Hash: 81418C76604741AFD324CF64DC95F6B77E8FB88B40F408A2DFA529A281DB70E904CB51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 1008261C: __EH_prolog.LIBCMT ref: 10082621
                                                        • Part of subcall function 1008261C: GetWindowDC.USER32(?,?,?,10024C21), ref: 1008264A
                                                      • GetClientRect.USER32 ref: 10024C32
                                                      • GetWindowRect.USER32(?,?), ref: 10024C41
                                                        • Part of subcall function 100823D6: ScreenToClient.USER32(?,?), ref: 100823EA
                                                        • Part of subcall function 100823D6: ScreenToClient.USER32(?,?), ref: 100823F3
                                                      • OffsetRect.USER32(?,?,?), ref: 10024C6C
                                                        • Part of subcall function 10082313: ExcludeClipRect.GDI32(?,?,?,?,?,753DA5C0,?,?,10024C7C,?), ref: 10082338
                                                        • Part of subcall function 10082313: ExcludeClipRect.GDI32(?,?,?,?,?,753DA5C0,?,?,10024C7C,?), ref: 1008234D
                                                      • OffsetRect.USER32(?,?,?), ref: 10024C8F
                                                      • FillRect.USER32(?,?,?), ref: 10024CAA
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect$Client$ClipExcludeOffsetScreenWindow$FillH_prolog
                                                      • String ID:
                                                      • API String ID: 2829754061-0
                                                      • Opcode ID: 68e01c18843117b0e44873cca8aa3d181ee55bf33c7b512b243ede801614737f
                                                      • Instruction ID: 7f52d0fc570e958b6adf76a8fb6c9332d7e6ec2007eeef81ec04a71d0453286f
                                                      • Opcode Fuzzy Hash: 68e01c18843117b0e44873cca8aa3d181ee55bf33c7b512b243ede801614737f
                                                      • Instruction Fuzzy Hash: B1317175608702AFD714DF14C855EABB7F8FB88710F008A1EF49687290DB74E905CB52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1293 100281a0-100281d4 call 1007b8f0 1296 100281e1 1293->1296 1297 100281d6-100281df call 10028890 1293->1297 1299 100281e3-100281ed 1296->1299 1297->1299 1301 1002820e-10028221 1299->1301 1302 100281ef-10028203 call 10022950 1299->1302 1305 10028224-1002823c 1302->1305 1306 10028205-10028209 1302->1306 1307 10028241-10028246 1305->1307 1308 1002823e 1305->1308 1306->1301 1309 10028248-1002824b 1307->1309 1310 1002824d-10028250 1307->1310 1308->1307 1311 1002825a-1002825f 1309->1311 1312 10028252-10028255 1310->1312 1313 10028257 1310->1313 1314 10028261-10028264 1311->1314 1315 10028266-10028269 1311->1315 1312->1311 1313->1311 1316 10028273-10028278 1314->1316 1317 10028270 1315->1317 1318 1002826b-1002826e 1315->1318 1319 10028336-1002836a call 1007dae5 1316->1319 1320 1002827e-10028282 1316->1320 1317->1316 1318->1316 1324 1002836f-10028372 1319->1324 1322 10028284-10028286 1320->1322 1323 10028288 1320->1323 1325 1002828b-1002829a call 10042e70 1322->1325 1323->1325 1324->1301 1327 10028378-1002838f call 10022cc0 1324->1327 1325->1319 1330 100282a0-100282c5 call 10082568 call 10042f40 1325->1330 1333 10028391-100283bc SendMessageA 1327->1333 1334 100283bf-100283c2 1327->1334 1340 100282e3-100282ec 1330->1340 1341 100282c7-100282d2 1330->1341 1335 100283c4-100283d5 SendMessageA 1334->1335 1336 100283db-100283ee 1334->1336 1335->1336 1344 10028326-1002832c 1340->1344 1345 100282ee-100282fe 1340->1345 1342 100282d4-100282d7 1341->1342 1343 100282de-100282e1 1341->1343 1342->1343 1347 100282d9-100282dc 1342->1347 1346 1002832d-10028331 call 100825da 1343->1346 1344->1346 1348 10028300-10028307 DestroyCursor 1345->1348 1349 1002830a-1002830f 1345->1349 1346->1319 1347->1346 1348->1349 1351 10028311-1002831a call 1007b919 1349->1351 1352 1002831d-10028323 call 1007b919 1349->1352 1351->1352 1352->1344
                                                      APIs
                                                      • DestroyCursor.USER32(?), ref: 10028301
                                                      • SendMessageA.USER32(?,000000F7,00000001,?), ref: 100283A3
                                                      • SendMessageA.USER32(?,000000F7,00000000,?), ref: 100283D5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CursorDestroy
                                                      • String ID: BUTTON
                                                      • API String ID: 1839592766-3405671355
                                                      • Opcode ID: f1e2f469b82ef27d96b83bc7f21b302ab663c8a2944f08c7e97b9ccb461a6776
                                                      • Instruction ID: 7389e20e4fb75f65e6637b77839c918b47ae64b84238301d6340fb5719ce137c
                                                      • Opcode Fuzzy Hash: f1e2f469b82ef27d96b83bc7f21b302ab663c8a2944f08c7e97b9ccb461a6776
                                                      • Instruction Fuzzy Hash: 61619EB9605B05DFD224CF55E880B6BB7E5FB84740F908A1DF98683280DB35FA48CB51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1357 10037490-100374a2 1358 100374a4-100374a6 1357->1358 1359 100374a8 1357->1359 1360 100374ae-100374d8 call 1003d4a0 * 2 1358->1360 1359->1360 1365 10037522-1003755a SendMessageA * 2 1360->1365 1366 100374da-100374e0 1360->1366 1368 1003755f-10037567 1365->1368 1369 1003755c-1003755d DestroyCursor 1365->1369 1366->1365 1367 100374e2-100374fe call 10034e90 1366->1367 1376 10037500-10037502 1367->1376 1377 1003751a-1003751e 1367->1377 1371 10037569-1003756a DestroyCursor 1368->1371 1372 1003756c-1003756f 1368->1372 1369->1368 1371->1372 1374 10037571-1003758b 1372->1374 1375 1003758c-100375a6 1372->1375 1376->1377 1378 10037504-10037513 call 10034a10 1376->1378 1377->1365 1380 10037518 1378->1380 1380->1365
                                                      APIs
                                                      • SendMessageA.USER32(?,00000080,00000001,?), ref: 10037538
                                                      • SendMessageA.USER32(?,00000080,00000000,?), ref: 1003754A
                                                      • DestroyCursor.USER32(?), ref: 1003755D
                                                      • DestroyCursor.USER32(?), ref: 1003756A
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CursorDestroyMessageSend
                                                      • String ID:
                                                      • API String ID: 3501257726-0
                                                      • Opcode ID: 30d47f896fc9ecdbb2b9956e80429269d4bae9b190339db1a524182ec9c07c45
                                                      • Instruction ID: 606009cacd0fc71ab6e2b506c454c9d2aba0a73ab13222fa3c59c214f098bf9f
                                                      • Opcode Fuzzy Hash: 30d47f896fc9ecdbb2b9956e80429269d4bae9b190339db1a524182ec9c07c45
                                                      • Instruction Fuzzy Hash: 10316D74604701AFE225DF65D880B9BB3E8FFC4711F41881DF999CB240D6B0F8088B62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageA.USER32(?,00000030,?,00000001), ref: 10022CF1
                                                      • SendMessageA.USER32(?,00000030,?,00000001), ref: 10022D09
                                                      • GetStockObject.GDI32(00000011), ref: 10022D13
                                                      • SendMessageA.USER32(?,00000030,00000000,00000001), ref: 10022D33
                                                        • Part of subcall function 10022B00: CreateFontIndirectA.GDI32 ref: 10022B49
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CreateFontIndirectObjectStock
                                                      • String ID:
                                                      • API String ID: 1613733799-0
                                                      • Opcode ID: 38bd6b799f1819f11bda73c7fb3d5dcadb50c46fb88dc480d396fa0a57e764d7
                                                      • Instruction ID: 750d10ec07833ca93870839551ff46b7729eb8de62ab1c79da02e5c732e67dc8
                                                      • Opcode Fuzzy Hash: 38bd6b799f1819f11bda73c7fb3d5dcadb50c46fb88dc480d396fa0a57e764d7
                                                      • Instruction Fuzzy Hash: E2018C36600320BBDB05CB94ED94F9737A8EF88751F018449FA049B191C770E942CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetStockObject.GDI32(00000005), ref: 1002B300
                                                      • LoadCursorA.USER32(00000000,00007F00), ref: 1002B30E
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CursorLoadObjectStock
                                                      • String ID:
                                                      • API String ID: 3794545487-0
                                                      • Opcode ID: 670c8644c26b3345d8163e1997b4a3b2d8c5581ff225ce2818fe85c20ebd1d6a
                                                      • Instruction ID: da0112a73fb660180becd2f52753e417cb42c54a66762639cfec70b0729f3cb7
                                                      • Opcode Fuzzy Hash: 670c8644c26b3345d8163e1997b4a3b2d8c5581ff225ce2818fe85c20ebd1d6a
                                                      • Instruction Fuzzy Hash: 0D318B75608B11AFE314DB54CC51B2BB7E4FB88B00F508A1DFA59C7380D735A804CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetErrorMode.KERNELBASE(00000000,00000000,1006A7AC,?,00000000,100C2494,00000000,?,?,?,?,1006B749,?,?,?,?), ref: 10085FA2
                                                      • SetErrorMode.KERNELBASE(00000000,?,1006B749,?,?,?,?,?,?), ref: 10085FA9
                                                        • Part of subcall function 10085FFC: GetModuleFileNameA.KERNEL32(?,?,00000104,?,?,00000000), ref: 1008602D
                                                        • Part of subcall function 10085FFC: lstrcpyA.KERNEL32(?,.HLP,?,?,00000104), ref: 100860CE
                                                        • Part of subcall function 10085FFC: lstrcatA.KERNEL32(?,.INI,?,?,00000104), ref: 100860FB
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$FileModuleNamelstrcatlstrcpy
                                                      • String ID:
                                                      • API String ID: 3389432936-0
                                                      • Opcode ID: 89b857c7985420859d4f36b99896bb94c5361fb2394628bfab67751e03e6bbb3
                                                      • Instruction ID: 74d3c2da114875d7f6642c98733af86d9deba566e893accd7e1542601acf009f
                                                      • Opcode Fuzzy Hash: 89b857c7985420859d4f36b99896bb94c5361fb2394628bfab67751e03e6bbb3
                                                      • Instruction Fuzzy Hash: EDF037B9D146148FDB44EF24C449B097BE5FF44721F06849BF5948B2A2DF71E840CB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • HeapCreate.KERNELBASE(00000000,00001000,00000000,1006B63F,00000001), ref: 1006FE06
                                                        • Part of subcall function 1006FCAD: GetVersionExA.KERNEL32 ref: 1006FCCC
                                                      • HeapDestroy.KERNEL32 ref: 1006FE45
                                                        • Part of subcall function 100738B5: HeapAlloc.KERNEL32(00000000,00000140,1006FE2E,000003F8), ref: 100738C2
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Heap$AllocCreateDestroyVersion
                                                      • String ID:
                                                      • API String ID: 2507506473-0
                                                      • Opcode ID: c8a895c06f4c9adba63e18c5e40fe6da41d83d97baf45b0dfbc526ef2c925259
                                                      • Instruction ID: 0d423d03dab8b694169857681baaa0bd0cc7343ec039a0d8778d2e76583c86d7
                                                      • Opcode Fuzzy Hash: c8a895c06f4c9adba63e18c5e40fe6da41d83d97baf45b0dfbc526ef2c925259
                                                      • Instruction Fuzzy Hash: 0DF06D71A51702AAFB61CB704D8A7793AD6EB40BD1F91482EFC44C90F6EF618481D751
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LoadImageA.USER32(?,?,00000001,00000020,00000020,00000000), ref: 1003DAEB
                                                      • LoadImageA.USER32(?,?,00000001,00000010,00000010,00000000), ref: 1003DAFD
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ImageLoad
                                                      • String ID:
                                                      • API String ID: 306446377-0
                                                      • Opcode ID: b9b99c1cbc631702b54bf21eb63466ecf1f6da6876c7157a62581435eb7aced6
                                                      • Instruction ID: a51e257ce89e863f7c54f1ac1e3237f75e8516d932bf00fd5828ea5429ef5043
                                                      • Opcode Fuzzy Hash: b9b99c1cbc631702b54bf21eb63466ecf1f6da6876c7157a62581435eb7aced6
                                                      • Instruction Fuzzy Hash: 7FE0ED32341311B7E620CE5A8C86F9BF7A9FB8DB10F100819B344AB1D2C6F1A4458669
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • DefWindowProcA.USER32(?,?,?,?), ref: 1007DE48
                                                      • CallWindowProcA.USER32(?,?,?,?,?), ref: 1007DE5D
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ProcWindow$Call
                                                      • String ID:
                                                      • API String ID: 2316559721-0
                                                      • Opcode ID: 6b978b3ddbab558451d5a550e7d7ebd642309c3ab21132211b9ece56b7739b24
                                                      • Instruction ID: 2b6cc57da32bd3a867268597f70a15816b7f3afc5ea160c812e50c563b6d76e5
                                                      • Opcode Fuzzy Hash: 6b978b3ddbab558451d5a550e7d7ebd642309c3ab21132211b9ece56b7739b24
                                                      • Instruction Fuzzy Hash: 97F01C36100619EFDF12AF94DC44D8A7BFAFF18390B04841AFA459A130D732D820EB44
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 100856DB: TlsGetValue.KERNEL32(100D0D34,?,?,10085121,10084A20,1008513D,100813C9,1006A835,?,1006B749,?,?,?,?,?,?), ref: 1008571A
                                                      • GetCurrentThreadId.KERNEL32 ref: 1007DA79
                                                      • SetWindowsHookExA.USER32(00000005,1007D861,00000000,00000000), ref: 1007DA89
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CurrentHookThreadValueWindows
                                                      • String ID:
                                                      • API String ID: 933525246-0
                                                      • Opcode ID: 0fb0e1cdb4bdafd2db8482c745b70b21d71f05ea35cf96e8fbe90ac791fd940b
                                                      • Instruction ID: b3a5cf77a6ce89495671960abac15b63d38f4b763c500fe9afc560b418ee1d91
                                                      • Opcode Fuzzy Hash: 0fb0e1cdb4bdafd2db8482c745b70b21d71f05ea35cf96e8fbe90ac791fd940b
                                                      • Instruction Fuzzy Hash: F1E0E532A04B016FD330DB619C44B0B36F4FB80752F01852FF28586000D774A8048FBA
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(00000000,?,?,?,?,?,?), ref: 1006D0BC
                                                        • Part of subcall function 100725D0: InitializeCriticalSection.KERNEL32(00000000,?,?,?,1006CF2D,00000009,?,?,?), ref: 1007260D
                                                        • Part of subcall function 100725D0: EnterCriticalSection.KERNEL32(?,?,?,1006CF2D,00000009,?,?,?), ref: 10072628
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$AllocateEnterHeapInitialize
                                                      • String ID:
                                                      • API String ID: 1616793339-0
                                                      • Opcode ID: c8c6187805301cff469cd0fbd34decc92847d379f29819717a89dfdc77284a38
                                                      • Instruction ID: 07dda625363ed22661672f0999c22593516d3cae55a330e0e217539af0d20fd1
                                                      • Opcode Fuzzy Hash: c8c6187805301cff469cd0fbd34decc92847d379f29819717a89dfdc77284a38
                                                      • Instruction Fuzzy Hash: 2021C435E00215ABFB10FB64DD82BDE77A5EB00760F154217F914EB1C1CB74A9828B58
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1007D3C3
                                                        • Part of subcall function 100856DB: TlsGetValue.KERNEL32(100D0D34,?,?,10085121,10084A20,1008513D,100813C9,1006A835,?,1006B749,?,?,?,?,?,?), ref: 1008571A
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: H_prologValue
                                                      • String ID:
                                                      • API String ID: 3700342317-0
                                                      • Opcode ID: 0a91fad13c1f53d317c3f6b1446f3096edb8a26e34a280afa6ce77c6673df446
                                                      • Instruction ID: 51f129e229a3aab294c0f0cccd2e725646206558ba73351722afbfe7cb926ceb
                                                      • Opcode Fuzzy Hash: 0a91fad13c1f53d317c3f6b1446f3096edb8a26e34a280afa6ce77c6673df446
                                                      • Instruction Fuzzy Hash: B4215772900209EFCB05EF54D481ADE7BB9FF44354F01806AF909AB641D779BE41CBA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateWindowExA.USER32(00000000,00000000,00000000,00000000,00000080,10058559,?,?,?,?,?,?), ref: 1007DB83
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CreateWindow
                                                      • String ID:
                                                      • API String ID: 716092398-0
                                                      • Opcode ID: 8cf7e12b9d810d5719be55614dfbdd56f4e91bd418d772d825bde7213c1cba6f
                                                      • Instruction ID: bfd323d6a0a23708fa0369d93ce2ef6f23139185d58cfe1de6c5e128e4efb758
                                                      • Opcode Fuzzy Hash: 8cf7e12b9d810d5719be55614dfbdd56f4e91bd418d772d825bde7213c1cba6f
                                                      • Instruction Fuzzy Hash: 39318B7AA00219EFCF41DFA8C845ADEBBF1FF4C210B11846AF958E7210E7359A509F54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b2da893c72598a8a7fe5f252be83aabaa43949f8353706f98cf64c89735accb1
                                                      • Instruction ID: cdba6eba3ecf34ccd9651ecdcfec9743f4b6c20fc489aed40e99dd32d50075b2
                                                      • Opcode Fuzzy Hash: b2da893c72598a8a7fe5f252be83aabaa43949f8353706f98cf64c89735accb1
                                                      • Instruction Fuzzy Hash: D5F0F837000A19FBCF12AE949D01DDE3B79EF052A4F00C403FA8865021C23AD620ABAA
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(02EC0000,00000000,?,?,?,10020C92,?), ref: 1003C441
                                                        • Part of subcall function 10034240: wsprintfA.USER32 ref: 10034252
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeapwsprintf
                                                      • String ID:
                                                      • API String ID: 1352872168-0
                                                      • Opcode ID: c28d68b4a8042ef74881ff04854996f1bf2a7dc8ae0322b5ee3a71b9f6b9883e
                                                      • Instruction ID: c91023447c129652ded283c2b8b5f8e4b9c6d8cda59018fd50897e04a3478274
                                                      • Opcode Fuzzy Hash: c28d68b4a8042ef74881ff04854996f1bf2a7dc8ae0322b5ee3a71b9f6b9883e
                                                      • Instruction Fuzzy Hash: F0E08CB990020CFFEB00DF90D881EAE77B8EB08301F008198F9088B340D631AE408BD0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlFreeHeap.NTDLL(02EC0000,00000000,00000000,00000000,?,10031F13,?), ref: 1003C588
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: FreeHeap
                                                      • String ID:
                                                      • API String ID: 3298025750-0
                                                      • Opcode ID: 5f0ae6f0c12c7239d27b4260280c510b80f3e9ed7e2780aa10e6ad34961f8c63
                                                      • Instruction ID: 55711178804d84d98daf6875c82448976619319c239efd1e6b5657dffb9e454b
                                                      • Opcode Fuzzy Hash: 5f0ae6f0c12c7239d27b4260280c510b80f3e9ed7e2780aa10e6ad34961f8c63
                                                      • Instruction Fuzzy Hash: A8D05B79740A49AFE755CB51CD85FAA37ECD744345F408014F6098E290E674FC80C7D1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LoadStringA.USER32(?,00000100,00000100,00000100), ref: 100816EB
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: LoadString
                                                      • String ID:
                                                      • API String ID: 2948472770-0
                                                      • Opcode ID: cc7fecb9393520a9bd15c7230a44ec168bd597859ead3d00a4f50bdeab1322e2
                                                      • Instruction ID: 617338e47c0125eaa1fb66d5b6ddcbe654eaf3b18d1ebb4e6fb287d10f7ad120
                                                      • Opcode Fuzzy Hash: cc7fecb9393520a9bd15c7230a44ec168bd597859ead3d00a4f50bdeab1322e2
                                                      • Instruction Fuzzy Hash: 1CD0A7768087B29BCB01CF509808D8FBBE8FF45320B094C4EF59093112D321D854D761
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ShowWindow.USER32(?,00000005,1003289E,00000005,00000000,?,?,?,?,?,000003E9,00000000,00000000,?,100CE570), ref: 1007FF67
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ShowWindow
                                                      • String ID:
                                                      • API String ID: 1268545403-0
                                                      • Opcode ID: ee8fde21ef4977019524fc5433c244942f31c7cd68bea0fb2bcb688b19746b89
                                                      • Instruction ID: bb12a6d64c5bff704f655000b964324544685be48a621af1d890c2fdcf8dd190
                                                      • Opcode Fuzzy Hash: ee8fde21ef4977019524fc5433c244942f31c7cd68bea0fb2bcb688b19746b89
                                                      • Instruction Fuzzy Hash: A4D09230604201EFDB059F60C948A1ABBB2FF85744F609579F4858A166DB36CC52EB15
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 100826D0: __EH_prolog.LIBCMT ref: 100826D5
                                                        • Part of subcall function 100826D0: BeginPaint.USER32(?,?,?,?,10026739), ref: 100826FE
                                                        • Part of subcall function 10082281: GetClipBox.GDI32(?,?), ref: 10082288
                                                      • DPtoLP.GDI32 ref: 1004AC8B
                                                      • GetClientRect.USER32(?,?), ref: 1004AC99
                                                      • DPtoLP.GDI32(?,?,00000002), ref: 1004ACB1
                                                      • IntersectRect.USER32(?,?,?), ref: 1004AD50
                                                      • LPtoDP.GDI32(?,?,00000002), ref: 1004AD91
                                                      • IntersectRect.USER32(?,?,?), ref: 1004ADEE
                                                      • LPtoDP.GDI32(?,?,00000002), ref: 1004AE2F
                                                      • CreateRectRgnIndirect.GDI32(?), ref: 1004AE5A
                                                      • IntersectRect.USER32(?,?,?), ref: 1004AE8E
                                                      • LPtoDP.GDI32(?,?,00000002), ref: 1004AECF
                                                      • CreateRectRgnIndirect.GDI32(?), ref: 1004AEF5
                                                      • CreateRectRgnIndirect.GDI32(?), ref: 1004AF24
                                                      • GetCurrentObject.GDI32(?,00000006), ref: 1004AF40
                                                      • GetCurrentObject.GDI32(?,00000001), ref: 1004AF59
                                                      • GetCurrentObject.GDI32(?,00000002), ref: 1004AF72
                                                        • Part of subcall function 10081F40: SetBkMode.GDI32(?,?), ref: 10081F59
                                                        • Part of subcall function 10081F40: SetBkMode.GDI32(?,?), ref: 10081F67
                                                        • Part of subcall function 1007ED18: GetScrollPos.USER32(00000000,1002F473), ref: 1007ED36
                                                        • Part of subcall function 1004A7A0: CreateFontIndirectA.GDI32(00000000), ref: 1004A7F2
                                                      • FillRgn.GDI32(?,?,?), ref: 1004B152
                                                      • IntersectRect.USER32(?,?,?), ref: 1004B237
                                                      • IsRectEmpty.USER32(?), ref: 1004B242
                                                      • LPtoDP.GDI32(?,?,00000002), ref: 1004B25F
                                                      • CreateRectRgnIndirect.GDI32(?), ref: 1004B26A
                                                      • CombineRgn.GDI32(?,?,?,00000004), ref: 1004B29B
                                                      • DPtoLP.GDI32(?,?,00000002), ref: 1004B2B9
                                                        • Part of subcall function 10082027: SetMapMode.GDI32(?,?), ref: 10082040
                                                        • Part of subcall function 10082027: SetMapMode.GDI32(?,?), ref: 1008204E
                                                      • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 1004B2F8
                                                      • IntersectRect.USER32(?,?,?), ref: 1004B38B
                                                      • IsRectEmpty.USER32(?), ref: 1004B3D1
                                                      • SelectObject.GDI32(?,?), ref: 1004B40C
                                                      • DPtoLP.GDI32(?,?,00000001), ref: 1004B498
                                                      • LPtoDP.GDI32(?,?,00000001), ref: 1004B5B7
                                                      • DPtoLP.GDI32(?,?,00000001), ref: 1004B5D5
                                                        • Part of subcall function 10082355: MoveToEx.GDI32(?,?,?,?), ref: 10082377
                                                        • Part of subcall function 10082355: MoveToEx.GDI32(?,?,?,?), ref: 1008238B
                                                        • Part of subcall function 100823A1: MoveToEx.GDI32(?,?,?,00000000), ref: 100823BB
                                                        • Part of subcall function 100823A1: LineTo.GDI32(?,?,?), ref: 100823CC
                                                        • Part of subcall function 10081E64: SelectObject.GDI32(10023605,00000000), ref: 10081E86
                                                        • Part of subcall function 10081E64: SelectObject.GDI32(10023605,?), ref: 10081E9C
                                                        • Part of subcall function 1004DDA0: GetCurrentObject.GDI32(?), ref: 1004DE6B
                                                        • Part of subcall function 1004DDA0: LPtoDP.GDI32(?,00000000,00000001), ref: 1004DEB8
                                                      • IntersectRect.USER32(?,00000000,?), ref: 1004B722
                                                      • IsRectEmpty.USER32(00000000), ref: 1004B72D
                                                      • PatBlt.GDI32(?,00000000,?,?,?,00F00021), ref: 1004B774
                                                      • LPtoDP.GDI32(?,00000000,00000002), ref: 1004B789
                                                      • CreateRectRgnIndirect.GDI32(00000000), ref: 1004B794
                                                      • CombineRgn.GDI32(?,?,?,00000004), ref: 1004B7C5
                                                      • LPtoDP.GDI32(?,?,00000001), ref: 1004B7F4
                                                      • DPtoLP.GDI32(?,?,00000001), ref: 1004B812
                                                      • wsprintfA.USER32 ref: 1004B8B0
                                                      • SelectObject.GDI32(?,?), ref: 1004B8D8
                                                      • IntersectRect.USER32(?,?,?), ref: 1004BE48
                                                      • IsRectEmpty.USER32(?), ref: 1004BE53
                                                      • LPtoDP.GDI32(?,?,00000002), ref: 1004BE70
                                                      • CreateRectRgnIndirect.GDI32(?), ref: 1004BE7B
                                                      • CombineRgn.GDI32(?,?,?,00000004), ref: 1004BEAC
                                                        • Part of subcall function 1004D460: SetRectEmpty.USER32(?), ref: 1004D4D8
                                                        • Part of subcall function 1004D460: GetSysColor.USER32(0000000F), ref: 1004D602
                                                        • Part of subcall function 1004D460: IntersectRect.USER32(?,?,?), ref: 1004D669
                                                      • GetSysColor.USER32(0000000F), ref: 1004B036
                                                        • Part of subcall function 100828CD: __EH_prolog.LIBCMT ref: 100828D2
                                                        • Part of subcall function 100828CD: CreateSolidBrush.GDI32(?), ref: 100828EF
                                                        • Part of subcall function 1008287D: __EH_prolog.LIBCMT ref: 10082882
                                                        • Part of subcall function 1008287D: CreatePen.GDI32(?,?,?), ref: 100828A5
                                                      • CreateRectRgnIndirect.GDI32(?), ref: 1004ADB6
                                                        • Part of subcall function 1004C2B0: CopyRect.USER32(?,00000000), ref: 1004C327
                                                        • Part of subcall function 1004C2B0: IsRectEmpty.USER32(?), ref: 1004C332
                                                        • Part of subcall function 1004C2B0: GetClientRect.USER32(00000000,?), ref: 1004C371
                                                        • Part of subcall function 1004C2B0: DPtoLP.GDI32(?,?,00000002), ref: 1004C383
                                                        • Part of subcall function 1004C2B0: LPtoDP.GDI32(?,?,00000002), ref: 1004C3C0
                                                      • FillRect.USER32(?,?,?), ref: 1004C1A9
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect$Create$IndirectIntersectObject$Empty$CurrentModeSelect$CombineH_prologMove$ClientColorFill$BeginBrushClipCopyFontLinePaintScrollSolidwsprintf
                                                      • String ID:
                                                      • API String ID: 3726329589-0
                                                      • Opcode ID: 6cd0ff4fe6027174c4319e88692b96eeec4905a47ca17b13c09fe5da7473977f
                                                      • Instruction ID: 27bf8540dceae79f90b161c64ca609da4bb91c5620c04cad86c90ff215efab26
                                                      • Opcode Fuzzy Hash: 6cd0ff4fe6027174c4319e88692b96eeec4905a47ca17b13c09fe5da7473977f
                                                      • Instruction Fuzzy Hash: DCD224756087859FD324DF24C895BAFB7E9FBC8700F10892EF58A83251DB70A905CB66
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsWindow.USER32(?), ref: 10032922
                                                      • IsIconic.USER32(?), ref: 1003295A
                                                      • SetActiveWindow.USER32(?), ref: 10032983
                                                      • IsWindow.USER32(?), ref: 100329AD
                                                      • IsWindow.USER32(?), ref: 10032C7E
                                                      • DestroyAcceleratorTable.USER32(?), ref: 10032DCE
                                                      • DestroyMenu.USER32(?), ref: 10032DD9
                                                      • DestroyAcceleratorTable.USER32(?), ref: 10032DF3
                                                      • DestroyMenu.USER32(?), ref: 10032E02
                                                      • DestroyAcceleratorTable.USER32(?), ref: 10032E62
                                                      • DestroyMenu.USER32(?,000003EA,00000000,00000000,?,?,00000000,?,?,?,000007D9,00000000,00000000), ref: 10032E71
                                                      • SetParent.USER32(?,?), ref: 10032EF3
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 1003300B
                                                      • IsWindow.USER32(?), ref: 1003313C
                                                      • SendMessageA.USER32(?,0000806F,00000000,00000000), ref: 10033151
                                                      • SendMessageA.USER32(?,00008004,00000000,00000000), ref: 1003316E
                                                      • DestroyAcceleratorTable.USER32(?), ref: 100331BC
                                                      • IsWindow.USER32(?), ref: 10033231
                                                      • IsWindow.USER32(?), ref: 10033281
                                                      • IsWindow.USER32(?), ref: 100332D1
                                                      • IsWindow.USER32(?), ref: 1003330E
                                                      • IsWindow.USER32(?), ref: 10033391
                                                      • GetParent.USER32(?), ref: 1003339F
                                                      • GetFocus.USER32 ref: 100333E0
                                                        • Part of subcall function 100327A0: IsWindow.USER32(?), ref: 1003281B
                                                        • Part of subcall function 100327A0: GetFocus.USER32 ref: 10032825
                                                        • Part of subcall function 100327A0: IsChild.USER32(?,00000000), ref: 10032837
                                                      • IsWindow.USER32(?), ref: 1003343F
                                                      • SendMessageA.USER32(?,00008076,00000000,00000000), ref: 10033454
                                                      • IsWindow.USER32(00000000), ref: 10033467
                                                      • GetFocus.USER32 ref: 10033471
                                                      • SetFocus.USER32(00000000), ref: 1003347C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Window$Destroy$AcceleratorFocusTable$MenuMessageSend$Parent$ActiveChildIconic
                                                      • String ID: d
                                                      • API String ID: 3681805233-2564639436
                                                      • Opcode ID: a62e97baf83fd3ea572e3740e01f23a4924e671dc1c535748e962338185a5b14
                                                      • Instruction ID: d3e7020ae877345fe13e13b80390b86ac09ec93c110132cb095db4ab330c05d4
                                                      • Opcode Fuzzy Hash: a62e97baf83fd3ea572e3740e01f23a4924e671dc1c535748e962338185a5b14
                                                      • Instruction Fuzzy Hash: CE729B75608341AFD321CF65D881B6BB7E9EF84781F51892DF9899B341DB34E801CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsWindowEnabled.USER32(?), ref: 1003AB39
                                                      • TranslateAcceleratorA.USER32(?,?,?,?), ref: 1003AB93
                                                      • IsChild.USER32(?,?), ref: 1003ABC4
                                                      • GetFocus.USER32 ref: 1003AD1F
                                                      • PostMessageA.USER32(?,000000A1,00000002,00000000), ref: 1003ADA9
                                                      • PostMessageA.USER32(?,000000A1,00000002,00000000), ref: 1003AE18
                                                      • IsChild.USER32(?,00000000), ref: 1003AEC1
                                                      • SendMessageA.USER32(?,00000010,00000000,00000000), ref: 1003AE92
                                                        • Part of subcall function 10030780: IsChild.USER32(?,?), ref: 100307FD
                                                        • Part of subcall function 10030780: GetParent.USER32(?), ref: 10030817
                                                      • IsWindow.USER32(?), ref: 1003B799
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ChildMessage$PostWindow$AcceleratorEnabledFocusParentSendTranslate
                                                      • String ID: 0$9$A$Z$hlp
                                                      • API String ID: 3372979518-114186910
                                                      • Opcode ID: 078e43aba69de53ba0bb7f7d3ac731d9cb0f330d9dc161b7c2e49fee62122def
                                                      • Instruction ID: 7dce007f5a05d1375a114b5b7198eb1647fc78cb69691f6a4179a9e716552066
                                                      • Opcode Fuzzy Hash: 078e43aba69de53ba0bb7f7d3ac731d9cb0f330d9dc161b7c2e49fee62122def
                                                      • Instruction Fuzzy Hash: B672DF74A087429FD726CE64C881B6E73E9EF85746F10492DFA85DB281DB34EC80CB52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 10034A83
                                                      • IsWindow.USER32(000103DE), ref: 10034A9F
                                                      • SendMessageA.USER32(000103DE,000083E7,?,00000000), ref: 10034AB8
                                                      • ExitProcess.KERNEL32 ref: 10034ACD
                                                      • FreeLibrary.KERNEL32(00000000,?,?,100CE570,?,1003C491,?,?,10034395), ref: 10034BA1
                                                      • FreeLibrary.KERNEL32(?,?,?,100CE570,?,1003C491,?,?,10034395), ref: 10034BF5
                                                      • DestroyCursor.USER32(00000000), ref: 10034C44
                                                      • DestroyCursor.USER32(00000000), ref: 10034C5B
                                                      • IsWindow.USER32(000103DE), ref: 10034C72
                                                      • DestroyCursor.USER32(?), ref: 10034D21
                                                      • WSACleanup.WS2_32 ref: 10034D6C
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CursorDestroy$FreeLibraryWindow$CleanupCurrentExitMessageProcessSendThread
                                                      • String ID:
                                                      • API String ID: 2560087610-0
                                                      • Opcode ID: cc985efb9fd3e83caa64490402c7edb63ed28405a5f20c9ca80e58df2b7ab75d
                                                      • Instruction ID: 74585b1845652d4d6120ec418deee86b1e974bc1696a27a3d5a2c6d70b89c8a7
                                                      • Opcode Fuzzy Hash: cc985efb9fd3e83caa64490402c7edb63ed28405a5f20c9ca80e58df2b7ab75d
                                                      • Instruction Fuzzy Hash: 28A17A78600B029FD756CF69C8C5BAAB7E9FF44341F42492CE5AA8B291DF30B941CB51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7617d8a4d1a8e5bd19003f1f64a70b1424b924a91ef2a09336d37b00267dc5f2
                                                      • Instruction ID: 6b7986d9f537c8e7b3b4a70f00d6aedbb32174e52ad147d06f04bb8b6af6b0c5
                                                      • Opcode Fuzzy Hash: 7617d8a4d1a8e5bd19003f1f64a70b1424b924a91ef2a09336d37b00267dc5f2
                                                      • Instruction Fuzzy Hash: 8EC1D57A7046188FE361DF28EC81A6BB3E4FB84315F504D2EE54ACB242D732FA158795
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(COMCTL32.DLL,00000800,00000000,00000400,1007FC5B,?,00020000), ref: 1007F96A
                                                      • LoadLibraryA.KERNEL32(COMCTL32.DLL), ref: 1007F973
                                                      • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 1007F987
                                                      • #17.COMCTL32 ref: 1007F9A2
                                                      • #17.COMCTL32 ref: 1007F9BE
                                                      • FreeLibrary.KERNEL32(00000000), ref: 1007F9CA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressFreeHandleLoadModuleProc
                                                      • String ID: COMCTL32.DLL$InitCommonControlsEx
                                                      • API String ID: 1437655972-4218389149
                                                      • Opcode ID: c687a07f44f886b733541d39e8467e8f9065bae31636c2fe3dfed999b30042fc
                                                      • Instruction ID: cf4b83f220563cab413bef912c0472fb4e2af95150f751cd65d434925ab18404
                                                      • Opcode Fuzzy Hash: c687a07f44f886b733541d39e8467e8f9065bae31636c2fe3dfed999b30042fc
                                                      • Instruction Fuzzy Hash: AAF06D36A10B63A7D313DBB48C88B6B77D8FB8469171A442BF694E3210D724DD05C776
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 52493804a438d9b4cce1f65f75da15988c1eef4462867f9f3ae9ed0a1c540561
                                                      • Instruction ID: b5d9612ddfb8e3a9f70063e48ff360f3d338e045c0ed052255a49b8271899c6d
                                                      • Opcode Fuzzy Hash: 52493804a438d9b4cce1f65f75da15988c1eef4462867f9f3ae9ed0a1c540561
                                                      • Instruction Fuzzy Hash: 9862EF756083419FC726CF24CC80A6FB7E5EF88355F158A2DF9899B281DB30E945CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA), ref: 100213FB
                                                      • GetProcAddress.KERNEL32(00000000), ref: 10021402
                                                      • GetDiskFreeSpaceA.KERNEL32(?,?,?,?,?), ref: 10021473
                                                      • MulDiv.KERNEL32(?,?,00000400), ref: 1002149D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: AddressDiskFreeHandleModuleProcSpace
                                                      • String ID: GetDiskFreeSpaceExA$c:\$kernel32.dll
                                                      • API String ID: 1197914913-2361203408
                                                      • Opcode ID: 650ec3b0f811507d5940873d24abdee361747786fed1ae5b723350b7d3050a22
                                                      • Instruction ID: fdc79b68114a62699626d4d90e5923c7f128532a17142acf3fbafdf956327539
                                                      • Opcode Fuzzy Hash: 650ec3b0f811507d5940873d24abdee361747786fed1ae5b723350b7d3050a22
                                                      • Instruction Fuzzy Hash: 9A315076604301AFC304DF68D8809ABB7E9FFD4764F844A1EF55987290D674DA0987A2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GlobalAlloc.KERNEL32(00000042,?), ref: 1004FEC7
                                                      • GlobalLock.KERNEL32(00000000,00000001), ref: 1004FEE3
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 1004FF05
                                                      • OpenClipboard.USER32(00000000), ref: 1004FF0D
                                                      • GlobalFree.KERNEL32(00000000), ref: 1004FF19
                                                      • EmptyClipboard.USER32 ref: 1004FF21
                                                      • SetClipboardData.USER32(0000C159,00000000), ref: 1004FF33
                                                      • CloseClipboard.USER32 ref: 1004FF39
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ClipboardGlobal$AllocCloseDataEmptyFreeLockOpenUnlock
                                                      • String ID:
                                                      • API String ID: 453615576-0
                                                      • Opcode ID: 5a188e9c12a48d58973087ae867b23b0efa7f5047323cefe57ba4aff02e4efd3
                                                      • Instruction ID: bf79abc4edadb5b59f0a04a1da5907a24031300156761f60a7dbd04e6b65694c
                                                      • Opcode Fuzzy Hash: 5a188e9c12a48d58973087ae867b23b0efa7f5047323cefe57ba4aff02e4efd3
                                                      • Instruction Fuzzy Hash: C031CC75608A51AFE704DB64CC89A6BB7E8FF88620F504A3DF896C3290CB74D805CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1007C5E0
                                                      • GetFullPathNameA.KERNEL32(?,00000104,?,?,?,?), ref: 1007C5FE
                                                      • lstrcpynA.KERNEL32(?,?,00000104), ref: 1007C60D
                                                      • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000,?,?), ref: 1007C641
                                                      • CharUpperA.USER32(?), ref: 1007C652
                                                      • FindFirstFileA.KERNEL32(?,?), ref: 1007C668
                                                      • FindClose.KERNEL32(00000000), ref: 1007C674
                                                      • lstrcpyA.KERNEL32(?,?), ref: 1007C684
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Find$CharCloseFileFirstFullH_prologInformationNamePathUpperVolumelstrcpylstrcpyn
                                                      • String ID:
                                                      • API String ID: 304730633-0
                                                      • Opcode ID: 42de2bed7310f11650aecda8b14f182f20c6c6246313e8b4e420f6648a1965de
                                                      • Instruction ID: 9e3125c7a6dff542eaf2553ca2e73b2d69f1b34680cd2a6772baee0ef92ed712
                                                      • Opcode Fuzzy Hash: 42de2bed7310f11650aecda8b14f182f20c6c6246313e8b4e420f6648a1965de
                                                      • Instruction Fuzzy Hash: 7B213B71900529AADB11DF61CC88EEF7FBCFF457A1F00811AF95AA6060C7349A45CBA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 1007B924: InterlockedIncrement.KERNEL32(-000000F4), ref: 1007B939
                                                      • FindFirstFileA.KERNEL32(?,?,*.*), ref: 1002A2BA
                                                        • Part of subcall function 100796CA: __EH_prolog.LIBCMT ref: 100796CF
                                                        • Part of subcall function 1007BBAF: InterlockedDecrement.KERNEL32(-000000F4), ref: 1007BBC3
                                                      • SendMessageA.USER32 ref: 1002A360
                                                      • FindNextFileA.KERNEL32(?,00000010), ref: 1002A36C
                                                      • FindClose.KERNEL32(?), ref: 1002A37F
                                                      • SendMessageA.USER32(?,00001102,00000002,?), ref: 1002A391
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Find$FileInterlockedMessageSend$CloseDecrementFirstH_prologIncrementNext
                                                      • String ID: *.*
                                                      • API String ID: 2486832813-438819550
                                                      • Opcode ID: f590d549e70b8d404d19bb81a4852c3a982b9df96bf681540010339492b6d7b5
                                                      • Instruction ID: cbdaade6f2abe4ab34f2c2d59170d28ea0df27a0e40b6eb8feee4e74c470c6b5
                                                      • Opcode Fuzzy Hash: f590d549e70b8d404d19bb81a4852c3a982b9df96bf681540010339492b6d7b5
                                                      • Instruction Fuzzy Hash: 4F418A75904381ABD710CF64DC95BEAB7E8FF88740F40891DFA9583290DB79E908CB22
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • OpenClipboard.USER32(00000000), ref: 1004FFCD
                                                      • GetClipboardData.USER32(0000C159), ref: 1004FFE6
                                                      • CloseClipboard.USER32 ref: 1004FFF2
                                                      • GlobalSize.KERNEL32(00000000), ref: 10050028
                                                      • GlobalLock.KERNEL32(00000000,00000000), ref: 10050030
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 10050048
                                                      • CloseClipboard.USER32 ref: 1005004E
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$Global$Close$DataLockOpenSizeUnlock
                                                      • String ID:
                                                      • API String ID: 2237123812-0
                                                      • Opcode ID: d85c4ca33cf79de1f87963a84a1114ab72c6faa8f45019afb6a46dc90953d405
                                                      • Instruction ID: e3769225a8bb3a69b3ee6a726363668c31e174f70607f18f7ee8c364995bd08e
                                                      • Opcode Fuzzy Hash: d85c4ca33cf79de1f87963a84a1114ab72c6faa8f45019afb6a46dc90953d405
                                                      • Instruction Fuzzy Hash: 14218B35600612AFE605DB64CC89E7FB7E9FF88291F10052AF945C3291EB25E90987A2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 1007FDF1: GetWindowLongA.USER32(?,000000F0), ref: 1007FDFD
                                                      • IsIconic.USER32(?), ref: 1003BD16
                                                      • IsZoomed.USER32(?), ref: 1003BD24
                                                      • GetWindowRect.USER32(?,?), ref: 1003BD42
                                                      • GetSystemMetrics.USER32(00000000), ref: 1003BD50
                                                      • GetSystemMetrics.USER32(00000001), ref: 1003BD56
                                                      • IsWindow.USER32(?), ref: 1003BD84
                                                      • ShowWindow.USER32(?,00000005,?,10032801,00000000,?,?,?,?,?,000003E9,00000000,00000000,?,100CE570), ref: 1003BD93
                                                        • Part of subcall function 1007FF59: ShowWindow.USER32(?,00000005,1003289E,00000005,00000000,?,?,?,?,?,000003E9,00000000,00000000,?,100CE570), ref: 1007FF67
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Window$MetricsShowSystem$IconicLongRectZoomed
                                                      • String ID:
                                                      • API String ID: 4099700322-0
                                                      • Opcode ID: 048018a81be5345a7a421166d0b2921e65e4be8d36faaee6ad8f0d561a64f764
                                                      • Instruction ID: 9f7cac0c28272b0e87aa75d84b1cdce51d9464396a7ca22d0fd698d8b42268e9
                                                      • Opcode Fuzzy Hash: 048018a81be5345a7a421166d0b2921e65e4be8d36faaee6ad8f0d561a64f764
                                                      • Instruction Fuzzy Hash: 9E110830700B119FE626EF719C46F6B3298EB80756F01481EF6469A192EB79E904CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindNextFileA.KERNEL32(?,?), ref: 10034492
                                                      • FindClose.KERNEL32 ref: 100344A1
                                                      • FindFirstFileA.KERNEL32(?,?), ref: 100344AD
                                                      • FindClose.KERNEL32(00000000), ref: 1003450B
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFile$FirstNext
                                                      • String ID:
                                                      • API String ID: 1164774033-0
                                                      • Opcode ID: f2a7f98824bba0363362cb4dee8affce0c8bdb4f260d4288ec6e9abe1b68ca77
                                                      • Instruction ID: 433efab811e427bc2c7eab9884d0ab198e7b0a2f4767d5f44e076d32a4203868
                                                      • Opcode Fuzzy Hash: f2a7f98824bba0363362cb4dee8affce0c8bdb4f260d4288ec6e9abe1b68ca77
                                                      • Instruction Fuzzy Hash: D021D73A905A519FE723CA24C8447AB73D4EB85766F170634ED688F180EF35FC058381
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 1007FDF1: GetWindowLongA.USER32(?,000000F0), ref: 1007FDFD
                                                      • GetKeyState.USER32(00000010), ref: 1007F1B2
                                                      • GetKeyState.USER32(00000011), ref: 1007F1BB
                                                      • GetKeyState.USER32(00000012), ref: 1007F1C4
                                                      • SendMessageA.USER32(?,00000111,0000E146,00000000), ref: 1007F1DA
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: State$LongMessageSendWindow
                                                      • String ID:
                                                      • API String ID: 1063413437-0
                                                      • Opcode ID: e69e6e0f0ec24510becb1400be15c331d9c64c2c35dd1bd1fea9ac7045b81550
                                                      • Instruction ID: dec0dc70566cb18763724a0384d46e97a36e2da7de3806af2d43dfd243a01e4f
                                                      • Opcode Fuzzy Hash: e69e6e0f0ec24510becb1400be15c331d9c64c2c35dd1bd1fea9ac7045b81550
                                                      • Instruction Fuzzy Hash: A8F0273678074767E520B2948C96FA90518CF40BD2F41842DFF81FA1D3899999028238
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID: 0-3916222277
                                                      • Opcode ID: 6ec9de6c1ee316e847461bc3cdd40613899bb0b0cb6406d7bb76f2ebb363c372
                                                      • Instruction ID: 40f699f6fb6a72bf772fb832d2cae84b095906cb270385f4f34c131147d4668c
                                                      • Opcode Fuzzy Hash: 6ec9de6c1ee316e847461bc3cdd40613899bb0b0cb6406d7bb76f2ebb363c372
                                                      • Instruction Fuzzy Hash: B1518D752047429FD318DF28C891AAFB7E8FB95354F200A2DF98683290DB34F945CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetKeyState.USER32(00000010), ref: 1004E6D0
                                                      • GetKeyState.USER32(00000011), ref: 1004E6E0
                                                      • CopyRect.USER32(00000000,00000000), ref: 1004E7B5
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: State$CopyRect
                                                      • String ID:
                                                      • API String ID: 4142901696-0
                                                      • Opcode ID: d72f2f1fade469f2daa42d927279f3fd288ac3f9aa09907f06fdad566219d377
                                                      • Instruction ID: 23cc94dcbd80fdb52f2a9663dadb8114bd8685d8c9606a7cd9a82aa17680073a
                                                      • Opcode Fuzzy Hash: d72f2f1fade469f2daa42d927279f3fd288ac3f9aa09907f06fdad566219d377
                                                      • Instruction Fuzzy Hash: 03A18D7534C382ABD664CA14C881F2FB3E9FBC4754F20492DFA86D72C1D6A1EC45876A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetLocalTime.KERNEL32(?), ref: 1006E217
                                                      • GetSystemTime.KERNEL32(?), ref: 1006E221
                                                      • GetTimeZoneInformation.KERNEL32(?), ref: 1006E276
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Time$InformationLocalSystemZone
                                                      • String ID:
                                                      • API String ID: 2475273158-0
                                                      • Opcode ID: fb55acca9be604dcb51c8093d0f8cf3cd72fc4117eb8e577f827b240b5221b03
                                                      • Instruction ID: c2fa796e3caf43e7e8ad0f3f13c13e30e9c787f1d0bdb8a937fcb33f723cb638
                                                      • Opcode Fuzzy Hash: fb55acca9be604dcb51c8093d0f8cf3cd72fc4117eb8e577f827b240b5221b03
                                                      • Instruction Fuzzy Hash: E9212C298002ABA9EF10EF9588546FE7BBFFB05B51F900201FC11A6194E7788DC6C734
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetKeyState.USER32(00000011), ref: 1003C7E1
                                                      • GetKeyState.USER32(00000010), ref: 1003C7F6
                                                      • GetKeyState.USER32(00000012), ref: 1003C80B
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: State
                                                      • String ID:
                                                      • API String ID: 1649606143-0
                                                      • Opcode ID: 0b714ff359af8094bc8a551ea3300aca942f379e987d9c214803cd052b3522b7
                                                      • Instruction ID: eba73ce3d950e55efdb8dff842283c4c240a9589dd4958fd3870c9d2573b7969
                                                      • Opcode Fuzzy Hash: 0b714ff359af8094bc8a551ea3300aca942f379e987d9c214803cd052b3522b7
                                                      • Instruction Fuzzy Hash: BB01A22FC481AE4DEB529366A808FE44581CB40BD2F574472CD0AFF6829E440D8727A2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c5accb3c6440fbb3e04585459631df425f9b4470f38c38d7ff7c825ed3a4c75c
                                                      • Instruction ID: 2d1de2b7479a3257b7be893a1eb6f36c9b81f4a4e58ebfeaba76b05ed621ef31
                                                      • Opcode Fuzzy Hash: c5accb3c6440fbb3e04585459631df425f9b4470f38c38d7ff7c825ed3a4c75c
                                                      • Instruction Fuzzy Hash: 55F0F9B590490EABDF42EFA1CC55AAE3BEAFF04384F408021FD25D5061DB30DA95EB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindResourceA.KERNEL32(?,1003FE33,000000F0), ref: 1007F663
                                                      • LoadResource.KERNEL32(?,00000000,?,?,?,1007CF05,?,?,1003FE33), ref: 1007F66F
                                                      • LockResource.KERNEL32(00000000,?,?,?,1007CF05,?,?,1003FE33), ref: 1007F67E
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Resource$FindLoadLock
                                                      • String ID:
                                                      • API String ID: 2752051264-0
                                                      • Opcode ID: 3225022fb899177408ce6ebb0b18b6dbd4b4a4e56790fdb816c16d0bbcedad9f
                                                      • Instruction ID: 1f8e4d9ffe004a2882b28ba96442a9d140fb2e91ee59485fbbb0a6e9a3637585
                                                      • Opcode Fuzzy Hash: 3225022fb899177408ce6ebb0b18b6dbd4b4a4e56790fdb816c16d0bbcedad9f
                                                      • Instruction Fuzzy Hash: 86E02236601611ABD742DBA14C8883FB39EFFC42E2B12882EF280C2031CB788C00867D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetKeyState.USER32(00000010), ref: 10080D6C
                                                      • GetKeyState.USER32(00000011), ref: 10080D75
                                                      • GetKeyState.USER32(00000012), ref: 10080D7E
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: State
                                                      • String ID:
                                                      • API String ID: 1649606143-0
                                                      • Opcode ID: fa820a93808f6927ce623ed40c5d30c564d3f5419657f3083f5cd75b89cc279b
                                                      • Instruction ID: 14d3128fdc5e78d7b4da6cefac5188db8ba3a380e8ae43026c68a567adbb329c
                                                      • Opcode Fuzzy Hash: fa820a93808f6927ce623ed40c5d30c564d3f5419657f3083f5cd75b89cc279b
                                                      • Instruction Fuzzy Hash: 30E06535D4039A9DFAC0D2C88D00F846690FB007D0F02CD73FE44AB092C6A0A8439F60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1007E434
                                                      • GetVersion.KERNEL32(00000007,?,?,00000000,00000000,?,0000C000,00000000,00000000,00000007), ref: 1007E5E7
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: H_prologVersion
                                                      • String ID:
                                                      • API String ID: 1836448879-0
                                                      • Opcode ID: 461940c4828bf1a76e925f7781e523f68a86a7145cfdb9ae9de798ff0117881d
                                                      • Instruction ID: c7797446843588c10dd0158d5264c664c0ffe2759ee9def67239f5b08bb4ed75
                                                      • Opcode Fuzzy Hash: 461940c4828bf1a76e925f7781e523f68a86a7145cfdb9ae9de798ff0117881d
                                                      • Instruction Fuzzy Hash: 15E17C75A01289EBDB54DF54CC80AAE37B9FF08314F20C516F8989B191DB38EE10DB69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Iconic
                                                      • String ID:
                                                      • API String ID: 110040809-0
                                                      • Opcode ID: d13cf7607325cbdbeddf2aeaefae5f630ece0b2516c5d3ce2dafcaaf0d2199ce
                                                      • Instruction ID: c8480c17700fb4af4b4ac9203f9061630ce34f79577b830e854454bbc51e171d
                                                      • Opcode Fuzzy Hash: d13cf7607325cbdbeddf2aeaefae5f630ece0b2516c5d3ce2dafcaaf0d2199ce
                                                      • Instruction Fuzzy Hash: B481AAB6214711CFD351CF28C480B8AB7E5FB99310F10886EE59ACB350D376E896CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: MTrk$d
                                                      • API String ID: 0-4044675371
                                                      • Opcode ID: 0c4dfd85936e52ba50a68956b5d59ba46cc5ce645aaf4dc35821e40a7a86c9a2
                                                      • Instruction ID: 07fc71c450d1fff86577fd14fd84307c7f47fa8fdc95b9ffc2a20b7c2c37403c
                                                      • Opcode Fuzzy Hash: 0c4dfd85936e52ba50a68956b5d59ba46cc5ce645aaf4dc35821e40a7a86c9a2
                                                      • Instruction Fuzzy Hash: 8E91E475B003069FD718CF68C88056AB7E2EFC8345B24893DE84ACB742EA75ED05CB55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 199df59392f585c7f32a0db947880e1515cf3a6d77a62c96809f10f4bb8d04a5
                                                      • Instruction ID: a23188c09b91f3cde2809cc5615911c12b08875f4d209c8d76511287c85ef6f8
                                                      • Opcode Fuzzy Hash: 199df59392f585c7f32a0db947880e1515cf3a6d77a62c96809f10f4bb8d04a5
                                                      • Instruction Fuzzy Hash: 52926475608B818FD329CF29D4906A6FBE2FF99304F24892DD5DB87B61D630B849CB41
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f082e93fd7b449a516b22f554e26427315c3d528e599a35ef9168aeb7a015294
                                                      • Instruction ID: 374278985d16b3f58a70079c1eb011c4f7e130d5fec685991fd547617e278a25
                                                      • Opcode Fuzzy Hash: f082e93fd7b449a516b22f554e26427315c3d528e599a35ef9168aeb7a015294
                                                      • Instruction Fuzzy Hash: A832AF75E0029ADFCB15CFA8C881AAEB7B5FF48311F244669E905AB381D734BD41CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_0007676F), ref: 100767BA
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: d18b329ba6927cab5dd906a43a7fd896cde89d76d51c47254a8ba1ff5a4367b7
                                                      • Instruction ID: d70766db93127a7e6683efe7cb60af1d2c303993ab91f15e29ff793d31c3c850
                                                      • Opcode Fuzzy Hash: d18b329ba6927cab5dd906a43a7fd896cde89d76d51c47254a8ba1ff5a4367b7
                                                      • Instruction Fuzzy Hash: 4FA001B4905AA49AEA459BA08DAC4943A61B64878A7844156EA6685224DB2900119A29
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32 ref: 100767CC
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: 2d6b72f70f999b0c6e4cf80760213f81dffa62fe229d3ba41e01716e66fc9330
                                                      • Instruction ID: 0f165aca6f4be1ca7c37932b686681d8af1577312b1acc5888c4cf823b7bb822
                                                      • Opcode Fuzzy Hash: 2d6b72f70f999b0c6e4cf80760213f81dffa62fe229d3ba41e01716e66fc9330
                                                      • Instruction Fuzzy Hash:
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7588268db9ad160e2392b48f534035be178d540a008719f74208fe9ed0531eb1
                                                      • Instruction ID: c12a6ad877f30b7fbbeb284014b8858e6209ad1eb9e174417692b78630500b81
                                                      • Opcode Fuzzy Hash: 7588268db9ad160e2392b48f534035be178d540a008719f74208fe9ed0531eb1
                                                      • Instruction Fuzzy Hash: 8F52A8767447094BD308CE9ACC9159EF3D7ABC8304F498A3CE956C3346EEB4E90AC655
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0a9e588a76068c3c4e2cc07af2021b6d3d608aa5d234e644fc88e85dc224264a
                                                      • Instruction ID: fe678defae4cc761ca241de0f203e6f46cdce448ea18793ad53c5e0d3c90cd41
                                                      • Opcode Fuzzy Hash: 0a9e588a76068c3c4e2cc07af2021b6d3d608aa5d234e644fc88e85dc224264a
                                                      • Instruction Fuzzy Hash: C7E1DC31E4424ACEEB25CF64C8417ED7BB1FB083C4F64C16AD888A6292D77D9D81CB58
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f5a391993e3f0a102ec167c9950eba0190c2ea36a715de8bb8fa7aeaa0d3d2a6
                                                      • Instruction ID: 156ba6081002371b8fd42a9c69fe6a6f188d141da737052c2af049910c4aea7f
                                                      • Opcode Fuzzy Hash: f5a391993e3f0a102ec167c9950eba0190c2ea36a715de8bb8fa7aeaa0d3d2a6
                                                      • Instruction Fuzzy Hash: 90C11335A087894FD356DF15D0607ABB7E7EF81B82F98892EE4C24B251D3349D49CB42
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fc60ecf50bd115ca0c6ea2745a91e2bccda0b72c85d336beea95e2ba67d1c3a9
                                                      • Instruction ID: ff0ed49d6fab20dcb907078c2b083eb61acd5875d5621227695e43b431d3c6cb
                                                      • Opcode Fuzzy Hash: fc60ecf50bd115ca0c6ea2745a91e2bccda0b72c85d336beea95e2ba67d1c3a9
                                                      • Instruction Fuzzy Hash: DDB16A35A0024ADFDB15CF04C5D0AA8BBE1FB48358F66C1ADD8595B382CB35EA56CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cab88bb81d6f1a3f294bb195b69a7ed404116198194961875d31482ad394f9ff
                                                      • Instruction ID: 8bff73f0803f8946e7b972c29f29bd9c6582ed2be7bff67ff44373b51b4f85a5
                                                      • Opcode Fuzzy Hash: cab88bb81d6f1a3f294bb195b69a7ed404116198194961875d31482ad394f9ff
                                                      • Instruction Fuzzy Hash: F4A1E575A087418FC318CF29C49095AFBE2FFC8714F198A6DE99987325E770E945CB82
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c85e5f8c1b8543d5e31b2507d484f8634bc59b4117db2810bbc7b5cb86d4c726
                                                      • Instruction ID: 815c22d68ed1259aa8a72c23c013f907963d78aa0587fb500ea53b4e3f5f4a6a
                                                      • Opcode Fuzzy Hash: c85e5f8c1b8543d5e31b2507d484f8634bc59b4117db2810bbc7b5cb86d4c726
                                                      • Instruction Fuzzy Hash: 1681193954A7819FC711CF29C0D0456FBE2BF9E204F5C999DE9C50B317D231A91ACB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e65a41849ba1dff17564a555de7faa284a3be694d3db7f60d411abc468340149
                                                      • Instruction ID: 109bc2c88c39a24f9b0743a6d895f774e222beb438e4579dd2ba9c7bb5988c89
                                                      • Opcode Fuzzy Hash: e65a41849ba1dff17564a555de7faa284a3be694d3db7f60d411abc468340149
                                                      • Instruction Fuzzy Hash: 4F112077E1C1414FD784DE29D4F46BBE3DBEBC5260729427BD0428F254F62299C59901
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4263d83a6fb9b114440df30be9fa905148a7d7abb542143c69aee057420f8470
                                                      • Instruction ID: 8c2f944167749e4e4a2cbbdc646367348bb5c45a472041d52f9da722aafee524
                                                      • Opcode Fuzzy Hash: 4263d83a6fb9b114440df30be9fa905148a7d7abb542143c69aee057420f8470
                                                      • Instruction Fuzzy Hash: 66F0C936704661CFCB61DF08C4D0A49B3F5FB08664B154869D98AEBB01C370FC88CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 62934d222dd5367758fa2cc9239e5cef7eada3e808f2fbca5bf17a751b375eec
                                                      • Instruction ID: 15f74aeb688a45a569e873cea9fab6a56cd4619f3bd6177f7ae7d1acca182123
                                                      • Opcode Fuzzy Hash: 62934d222dd5367758fa2cc9239e5cef7eada3e808f2fbca5bf17a751b375eec
                                                      • Instruction Fuzzy Hash: 68B012242156C94AC206CB245462712B7EC534484CF1444A88446C3742D455E403D650
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetDC.USER32(?), ref: 10056032
                                                        • Part of subcall function 1003DC00: EnumDisplaySettingsA.USER32(00000000,000000FF,?), ref: 1003DC0F
                                                      • SetStretchBltMode.GDI32(00000000,00000000), ref: 10056045
                                                      • CreateCompatibleDC.GDI32(00000000), ref: 10056052
                                                      • CreateCompatibleDC.GDI32(00000000), ref: 10056057
                                                      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 100560A8
                                                      • SelectObject.GDI32(00000000,00000000), ref: 100560BC
                                                      • SelectObject.GDI32(?,?), ref: 100560E6
                                                      • PatBlt.GDI32(?,00000000,00000000,?,?,00F00021), ref: 10056108
                                                      • SelectObject.GDI32(?,?), ref: 10056118
                                                      • SelectObject.GDI32(?,?), ref: 10056124
                                                      • GetTickCount.KERNEL32 ref: 10056172
                                                      • SelectObject.GDI32(?,?), ref: 100561AA
                                                      • SelectObject.GDI32(00000000,00000000), ref: 100561C6
                                                      • BitBlt.GDI32(?,?,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 100561EB
                                                      • SelectObject.GDI32(00000000,?), ref: 100561F7
                                                      • DeleteObject.GDI32(00000000), ref: 100561FE
                                                      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 10056242
                                                      • SelectObject.GDI32(00000000,00000000), ref: 1005624E
                                                      • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,?,00000000,00CC0020), ref: 10056273
                                                      • SelectObject.GDI32(00000000,?), ref: 1005627F
                                                      • SelectObject.GDI32(00000000,?), ref: 10056287
                                                      • CreateCompatibleDC.GDI32(00000000), ref: 1005629C
                                                      • CreateCompatibleDC.GDI32(00000000), ref: 100562A5
                                                      • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 100562BB
                                                      • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 100562D3
                                                      • SelectObject.GDI32(00000000,?), ref: 100562E3
                                                      • SelectObject.GDI32(00000000,?), ref: 100562F3
                                                      • SetBkColor.GDI32(00000000,?), ref: 10056305
                                                      • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 10056326
                                                      • SetBkColor.GDI32(00000000,?), ref: 10056332
                                                      • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00330008), ref: 1005634F
                                                      • BitBlt.GDI32(?,?,00000000,?,?,00000000,00000000,00000000,008800C6), ref: 10056374
                                                      • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,008800C6), ref: 10056391
                                                      • BitBlt.GDI32(?,?,00000000,?,?,00000000,00000000,00000000,00EE0086), ref: 100563B6
                                                      • SelectObject.GDI32(00000000,?), ref: 100563C2
                                                      • DeleteObject.GDI32(00000000), ref: 100563C9
                                                      • SelectObject.GDI32(00000000,?), ref: 100563D5
                                                      • DeleteObject.GDI32(00000000), ref: 100563DC
                                                      • DeleteDC.GDI32(00000000), ref: 100563E9
                                                      • DeleteDC.GDI32(00000000), ref: 100563EC
                                                      • SelectObject.GDI32(00000000,?), ref: 10056425
                                                      • DeleteObject.GDI32(?), ref: 1005642C
                                                      • IsWindow.USER32(?), ref: 10056436
                                                      • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,?,?,00CC0020), ref: 1005649A
                                                      • BitBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00CC0020), ref: 100564C4
                                                      • SelectObject.GDI32(?,?), ref: 100564D4
                                                      • Sleep.KERNEL32(0000000A), ref: 10056520
                                                      • GetTickCount.KERNEL32 ref: 10056526
                                                      • DeleteObject.GDI32(00000000), ref: 10056553
                                                      • DeleteDC.GDI32(00000000), ref: 10056560
                                                      • DeleteDC.GDI32(?), ref: 10056567
                                                      • ReleaseDC.USER32(?,00000000), ref: 1005656E
                                                        • Part of subcall function 10055B30: GetClientRect.USER32(?,?), ref: 10055B57
                                                        • Part of subcall function 10055B30: __ftol.LIBCMT ref: 10055C2E
                                                        • Part of subcall function 10055B30: __ftol.LIBCMT ref: 10055C41
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Object$Select$Delete$Create$Compatible$Bitmap$ColorCountStretchTick__ftol$ClientDisplayEnumModeRectReleaseSettingsSleepWindow
                                                      • String ID:
                                                      • API String ID: 1975044605-0
                                                      • Opcode ID: 84562360580e0997827d8d260b0efccf55a7efb7da91f941be24690b9142a81e
                                                      • Instruction ID: 575c0bfdcc1e139f62dc73a8489ee6c3acfd76f7f16051ccee8a42f7c20a362b
                                                      • Opcode Fuzzy Hash: 84562360580e0997827d8d260b0efccf55a7efb7da91f941be24690b9142a81e
                                                      • Instruction Fuzzy Hash: 3202B5B5604B00AFE324DF65CC85F6BB7E9FB88B44F10490DFA9693290DB74E8058B25
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 1003D3B0: SendMessageA.USER32(?,00000143,00000000,?), ref: 1003D3D3
                                                      • GetProfileStringA.KERNEL32(windows,device,,,,,?,000001F4), ref: 1005A9D9
                                                      • GetProfileStringA.KERNEL32(devices,00000000,100C2494,?,00001000), ref: 1005AA18
                                                      • GetProfileStringA.KERNEL32(devices,?,,,,,?,000000C8), ref: 1005AA5A
                                                      • SendMessageA.USER32(?,00000143,00000000), ref: 1005AB1B
                                                      • SendMessageA.USER32(?,0000014E,?,00000000), ref: 1005AB58
                                                      • SendMessageA.USER32(?,0000014E,?,00000000), ref: 1005ABFB
                                                      • wsprintfA.USER32 ref: 1005AC14
                                                      • wsprintfA.USER32 ref: 1005AC3A
                                                      • wsprintfA.USER32 ref: 1005AC60
                                                      • SendMessageA.USER32(?,000000F1,00000001,00000000), ref: 1005AC93
                                                      • SendMessageA.USER32(?,000000F1,00000001,00000000), ref: 1005ACBE
                                                      • SendMessageA.USER32(?,000000F1,00000001,00000000), ref: 1005ACD4
                                                      • SendMessageA.USER32(?,0000014E,?,00000000), ref: 1005ACEB
                                                      • SendMessageA.USER32(?,000000F1,00000001,00000000), ref: 1005AD2F
                                                      • wsprintfA.USER32 ref: 1005AD42
                                                      • wsprintfA.USER32 ref: 1005AD6C
                                                      • SendMessageA.USER32(?,000000F1,00000001,00000000), ref: 1005AD92
                                                      • SendMessageA.USER32(?,000000F1,00000001,00000000), ref: 1005ADD3
                                                      • wsprintfA.USER32 ref: 1005ADE4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$wsprintf$ProfileString
                                                      • String ID: ,,,$device$devices$none$windows
                                                      • API String ID: 2373861888-528626633
                                                      • Opcode ID: 04d968e04cecc521d9b2aac95a9e9e60e0e351fc93ab00f43c52d8462b1d8fb0
                                                      • Instruction ID: 1c5f6d97e869ad657e7dba78f49bf83806f71cc1359244b41a5da79c67613051
                                                      • Opcode Fuzzy Hash: 04d968e04cecc521d9b2aac95a9e9e60e0e351fc93ab00f43c52d8462b1d8fb0
                                                      • Instruction Fuzzy Hash: 4CC19FB51407026BD624DB70CC81FEBB3E8EB88745F004A1DF69A97191EB74FA48CB65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetSysColor.USER32(00000010), ref: 1005EB28
                                                        • Part of subcall function 10084845: SetBkColor.GDI32(?,?), ref: 10084854
                                                        • Part of subcall function 10084845: ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 10084886
                                                      • GetSysColor.USER32(00000014), ref: 1005EB60
                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 1005EB92
                                                      • GetSysColor.USER32(00000016), ref: 1005EBAB
                                                      • GetSysColor.USER32(0000000F), ref: 1005EBBB
                                                      • DrawEdge.USER32(?,?,00000002,0000000F), ref: 1005EBF4
                                                      • GetDeviceCaps.GDI32(?), ref: 1005EDFE
                                                      • RealizePalette.GDI32(?), ref: 1005EE21
                                                      • GetSysColor.USER32(00000014), ref: 1005EE39
                                                      • GetSysColor.USER32(0000000F), ref: 1005EE4B
                                                      • GetSysColor.USER32(0000000F), ref: 1005EB01
                                                        • Part of subcall function 1008481B: SetBkColor.GDI32(?,?), ref: 10084825
                                                        • Part of subcall function 1008481B: ExtTextOutA.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 1008483B
                                                      • GetSysColor.USER32(0000000F), ref: 1005EC58
                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 1005EC91
                                                      • GetSysColor.USER32(00000016), ref: 1005ECA6
                                                      • GetSysColor.USER32(0000000F), ref: 1005ECB2
                                                      • InflateRect.USER32(?,?,?), ref: 1005ECF3
                                                      • GetSysColor.USER32(00000010), ref: 1005ECF7
                                                      • Rectangle.GDI32(?,?,?,?,?), ref: 1005ED3E
                                                      • DrawEdge.USER32(?,?,00000002,0000000F), ref: 1005ED79
                                                      • DrawEdge.USER32(?,?,00000002,0000000F), ref: 1005EE80
                                                      • GetSysColor.USER32(00000010), ref: 1005EEDD
                                                      • CreatePen.GDI32(00000000,00000001,00000000), ref: 1005EEE4
                                                      • InflateRect.USER32(?,?,?), ref: 1005EF23
                                                      • Rectangle.GDI32(?,?,?,?,?), ref: 1005EF41
                                                      • GetDeviceCaps.GDI32(?,00000026), ref: 1005EF77
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Color$InflateRect$DrawEdge$CapsDeviceRectangleText$CreatePaletteRealize
                                                      • String ID:
                                                      • API String ID: 3119264602-0
                                                      • Opcode ID: aa38330a6ba5529795b1be5ddcc889c8e73d2d3ea80c79cd8782b2f7ea52632d
                                                      • Instruction ID: be7e94cc713b70ba82b7c5aa8e2fdd4841afbd92bdd6466c20f2a62bbc87b041
                                                      • Opcode Fuzzy Hash: aa38330a6ba5529795b1be5ddcc889c8e73d2d3ea80c79cd8782b2f7ea52632d
                                                      • Instruction Fuzzy Hash: EFF15575604741AFD714DF64C885E6AB7E9FF88700F008A1EF69687691EB70EC05CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetFocus.USER32 ref: 10033A4F
                                                      • GetWindowRect.USER32(?,?), ref: 10033AA6
                                                      • GetParent.USER32(?), ref: 10033AB6
                                                      • GetParent.USER32(?), ref: 10033AE9
                                                      • GlobalSize.KERNEL32(00000000), ref: 10033B33
                                                      • GlobalLock.KERNEL32(00000000,00000000), ref: 10033B3B
                                                      • IsWindow.USER32(?), ref: 10033B54
                                                      • GetTopWindow.USER32(?), ref: 10033B91
                                                      • GetWindow.USER32(00000000,00000002), ref: 10033BAA
                                                      • SetParent.USER32(?,?), ref: 10033BD6
                                                      • SendMessageA.USER32(?,0000806F,00000000,00000000), ref: 10033C21
                                                      • SendMessageA.USER32(?,00008076,00000000,00000000), ref: 10033C30
                                                      • GetParent.USER32(?), ref: 10033C43
                                                      • SendMessageA.USER32(?,00008004,00000000,00000000), ref: 10033C5C
                                                      • GetWindowLongA.USER32(?,000000F0), ref: 10033C64
                                                      • SendMessageA.USER32(?,0000130B,00000000,00000000), ref: 10033C94
                                                      • SendMessageA.USER32(?,0000130C,00000000,00000000), ref: 10033CA2
                                                      • IsWindow.USER32(?), ref: 10033CEE
                                                      • GetFocus.USER32 ref: 10033CF8
                                                      • SetFocus.USER32(?,00000000), ref: 10033D10
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 10033D1B
                                                      • GlobalFree.KERNEL32(00000000), ref: 10033D22
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSend$GlobalParent$Focus$FreeLockLongRectSizeUnlock
                                                      • String ID:
                                                      • API String ID: 300820980-0
                                                      • Opcode ID: 8c37087bf889934029cf517ee17ceeb74909ce52073f4f616999c32af0fed17d
                                                      • Instruction ID: 43d2c29cf0ed5fd6b0cce39686a98e9c403543043b2f42674a84db5947641e8f
                                                      • Opcode Fuzzy Hash: 8c37087bf889934029cf517ee17ceeb74909ce52073f4f616999c32af0fed17d
                                                      • Instruction Fuzzy Hash: 10A155B5608701AFD311DFA5CC85B2BB7E8FB88741F108A1DFA919B391CB74E9018B61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000022B8), ref: 10058085
                                                      • EnterCriticalSection.KERNEL32(?), ref: 100580A8
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 100580B6
                                                      • waveOutUnprepareHeader.WINMM(?,?,00000020), ref: 100580D8
                                                      • waveOutPrepareHeader.WINMM(?,?,00000020), ref: 10058121
                                                      • waveOutWrite.WINMM(?,?,00000020), ref: 1005812E
                                                      • EnterCriticalSection.KERNEL32(?), ref: 10058138
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 10058146
                                                      • EnterCriticalSection.KERNEL32(?), ref: 10058175
                                                      • ReleaseSemaphore.KERNEL32(?,00000014,00000000), ref: 10058193
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 1005819A
                                                      • waveOutPause.WINMM(?), ref: 100581A9
                                                      • waveOutReset.WINMM(?), ref: 100581B3
                                                      • waveOutUnprepareHeader.WINMM(?,00000000,00000020), ref: 100581D1
                                                      • waveOutUnprepareHeader.WINMM(?,?,00000020), ref: 100581F6
                                                      • EnterCriticalSection.KERNEL32(100CF000), ref: 1005820C
                                                      • LeaveCriticalSection.KERNEL32(100CF000), ref: 10058268
                                                      • CloseHandle.KERNEL32(?), ref: 10058296
                                                      • CloseHandle.KERNEL32(?), ref: 1005829C
                                                      • CloseHandle.KERNEL32(?), ref: 100582A2
                                                      • DeleteCriticalSection.KERNEL32(?), ref: 100582A8
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$wave$EnterHeaderLeave$CloseHandleUnprepare$DeleteMultipleObjectsPausePrepareReleaseResetSemaphoreWaitWrite
                                                      • String ID:
                                                      • API String ID: 361331667-0
                                                      • Opcode ID: 4d8c216158a805e451a2043bc1143d1af9e650c531052e1cfc6662cb1eee8cad
                                                      • Instruction ID: d59d0b0ac9638af957a972997c868d121716ab5e5b2da80463f6e23ba7396d22
                                                      • Opcode Fuzzy Hash: 4d8c216158a805e451a2043bc1143d1af9e650c531052e1cfc6662cb1eee8cad
                                                      • Instruction Fuzzy Hash: 68717E75A006299FEB55CF64CD89AAE7BA8FF48700F048519FD06EB251C734EA09CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetStockObject.GDI32(0000000F), ref: 10040CE4
                                                      • GetObjectA.GDI32(?,00000018,?), ref: 10040CF7
                                                      • SelectPalette.GDI32(?,00000000,00000000), ref: 10040D52
                                                      • RealizePalette.GDI32(?), ref: 10040D5C
                                                      • GlobalAlloc.KERNEL32(00000002,00000028), ref: 10040D66
                                                      • SelectPalette.GDI32(?,?,00000000), ref: 10040D7C
                                                      • GlobalLock.KERNEL32(00000000), ref: 10040D84
                                                      • GetDIBits.GDI32(?,?,00000000,?,00000000,00000000,00000000), ref: 10040DB3
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 10040E09
                                                      • GlobalReAlloc.KERNEL32(00000000,?,00000002), ref: 10040E12
                                                      • GlobalLock.KERNEL32(00000000), ref: 10040E1F
                                                      • GetDIBits.GDI32(?,?,00000000,?,00000000,00000000,00000000), ref: 10040E42
                                                      • SelectPalette.GDI32(?,?,00000000), ref: 10040E55
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 10040E5C
                                                      • GlobalFree.KERNEL32(00000000), ref: 10040E63
                                                        • Part of subcall function 100825DA: __EH_prolog.LIBCMT ref: 100825DF
                                                        • Part of subcall function 100825DA: ReleaseDC.USER32(00000000,00000000), ref: 100825FE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Global$Palette$Select$AllocBitsLockObjectUnlock$FreeH_prologRealizeReleaseStock
                                                      • String ID: (
                                                      • API String ID: 3986717603-3887548279
                                                      • Opcode ID: a4903eb209db75b670763bb37834cce0f100ae44ef9c4483ac7077777c9dd54a
                                                      • Instruction ID: 6d2833503edc971bd5293b90f009f1392a35601f26b43a4cd8d627d8e53d4b7c
                                                      • Opcode Fuzzy Hash: a4903eb209db75b670763bb37834cce0f100ae44ef9c4483ac7077777c9dd54a
                                                      • Instruction Fuzzy Hash: 61616972A047509FD321DB54CC84B5FBBE8FB88710F10492DFA95A7291DB74E805CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 100826D0: __EH_prolog.LIBCMT ref: 100826D5
                                                        • Part of subcall function 100826D0: BeginPaint.USER32(?,?,?,?,10026739), ref: 100826FE
                                                        • Part of subcall function 10082281: GetClipBox.GDI32(?,?), ref: 10082288
                                                      • IsRectEmpty.USER32(?), ref: 10027995
                                                      • GetCurrentObject.GDI32(?,00000002), ref: 100279DA
                                                      • GetCurrentObject.GDI32(?,00000001), ref: 100279ED
                                                      • GetClientRect.USER32 ref: 10027A72
                                                      • CreatePen.GDI32(-00000003,00000000,?), ref: 10027A8E
                                                      • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 10027B52
                                                        • Part of subcall function 10082742: __EH_prolog.LIBCMT ref: 10082747
                                                        • Part of subcall function 10082742: EndPaint.USER32(?,?,?,?,100267B3), ref: 10082764
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CurrentH_prologObjectPaintRect$BeginClientClipCreateEmpty
                                                      • String ID: gfff
                                                      • API String ID: 3506841274-1553575800
                                                      • Opcode ID: 213505db3a4d81b32805edf8822c5ae9e08c776a8bdffc77ff826f0264058ced
                                                      • Instruction ID: 95a64100dd92c1917ab7e0cab91cecd9f0c743f8bb47bded2651abc3dd2f0e68
                                                      • Opcode Fuzzy Hash: 213505db3a4d81b32805edf8822c5ae9e08c776a8bdffc77ff826f0264058ced
                                                      • Instruction Fuzzy Hash: 11E158B59083419BC714CF64D891A6FB7E8FFC8710F504A1EF99987291DB34E909CB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetWindowRgn.USER32(?,00000000,00000001), ref: 10038FB1
                                                      • GetWindowRect.USER32(?,?), ref: 10038FDE
                                                      • BeginPath.GDI32(?), ref: 10039067
                                                      • MulDiv.KERNEL32(7FFF0000,?,00007FFF), ref: 10039080
                                                      • MulDiv.KERNEL32(00000000,?,00007FFF), ref: 1003908F
                                                      • MulDiv.KERNEL32(3FFF0000,?,00007FFF), ref: 100390B7
                                                      • MulDiv.KERNEL32(00000000,?,00007FFF), ref: 100390C6
                                                      • EndPath.GDI32(?), ref: 100390E1
                                                      • PathToRegion.GDI32(?), ref: 100390EC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Path$Window$BeginRectRegion
                                                      • String ID: gfff$gfff
                                                      • API String ID: 3989698161-3084402119
                                                      • Opcode ID: 5c4019e4c70ae7f8c3deb9e408d02abce427d64225ef18a3ed4f33e90feafee3
                                                      • Instruction ID: 500d9f4a19f7973feaa9c35d898cccbbff430858e12898c14d4bb82d3183cb15
                                                      • Opcode Fuzzy Hash: 5c4019e4c70ae7f8c3deb9e408d02abce427d64225ef18a3ed4f33e90feafee3
                                                      • Instruction Fuzzy Hash: 4A81E3B1904742AFD318DF24CC85E6BBBE9FB94740F04492EF58687291EA34AD05CB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 100856DB: TlsGetValue.KERNEL32(100D0D34,?,?,10085121,10084A20,1008513D,100813C9,1006A835,?,1006B749,?,?,?,?,?,?), ref: 1008571A
                                                      • CallNextHookEx.USER32(?,00000003,?,?), ref: 1007D88B
                                                      • GetClassLongA.USER32(?,000000E6), ref: 1007D8D2
                                                      • GlobalGetAtomNameA.KERNEL32(?,?,00000005), ref: 1007D8FE
                                                      • lstrcmpiA.KERNEL32(?,ime), ref: 1007D90D
                                                      • GetWindowLongA.USER32(?,000000FC), ref: 1007D980
                                                      • SetWindowLongA.USER32(?,000000FC,00000000), ref: 1007D9A1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Long$Window$AtomCallClassGlobalHookNameNextValuelstrcmpi
                                                      • String ID: AfxOldWndProc423$ime
                                                      • API String ID: 3731301195-104836986
                                                      • Opcode ID: 61474fe79d538cdbd7e7e0554fe60fa7fe31ab2f5972732731615ecd84c8145a
                                                      • Instruction ID: 09283c16f863836067320d6cd8a233524be784611a2ce6e9753fc4955ef41977
                                                      • Opcode Fuzzy Hash: 61474fe79d538cdbd7e7e0554fe60fa7fe31ab2f5972732731615ecd84c8145a
                                                      • Instruction Fuzzy Hash: C951E532900626BFDB11EF60CC48B9E3BB8FF44391F118516F995A71A1D738DA40CBA9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateDIBitmap.GDI32(?,?,00000004,?,?,00000000), ref: 10042FC7
                                                      • CreateCompatibleDC.GDI32(?), ref: 10042FDF
                                                      • CreateCompatibleDC.GDI32(?), ref: 10042FE4
                                                      • SelectObject.GDI32(00000000,?), ref: 10042FED
                                                      • CreateCompatibleBitmap.GDI32(?,?,?), ref: 10043000
                                                      • SelectObject.GDI32(00000000,00000000), ref: 10043012
                                                      • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 1004302F
                                                      • SelectObject.GDI32(00000000,?), ref: 1004303B
                                                      • DeleteDC.GDI32(00000000), ref: 10043044
                                                      • SelectObject.GDI32(00000000,?), ref: 1004304C
                                                      • DeleteDC.GDI32(00000000), ref: 1004304F
                                                      • DeleteObject.GDI32(?), ref: 10043055
                                                      • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 1004308D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CreateObject$Select$BitmapCompatibleDelete
                                                      • String ID: (
                                                      • API String ID: 1878064223-3887548279
                                                      • Opcode ID: 91ac08d1aa6f9f08381494747b44e46a3704363179cc22ddc7039a07dfb2d602
                                                      • Instruction ID: cb536c83624b147381c77202a6f41546fba80ed974acccecc030b4583f61f167
                                                      • Opcode Fuzzy Hash: 91ac08d1aa6f9f08381494747b44e46a3704363179cc22ddc7039a07dfb2d602
                                                      • Instruction Fuzzy Hash: 7E7137B5600708AFD324DF56DC80A6BF7F9FB89610F508A2EE65683650D731F844CB65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 1007FDF1: GetWindowLongA.USER32(?,000000F0), ref: 1007FDFD
                                                      • GetParent.USER32(?), ref: 1007F4BA
                                                      • SendMessageA.USER32(00000000,0000036B,00000000,00000000), ref: 1007F4DD
                                                      • GetWindowRect.USER32(?,?), ref: 1007F4F6
                                                      • GetWindowLongA.USER32(00000000,000000F0), ref: 1007F509
                                                      • CopyRect.USER32(?,?), ref: 1007F556
                                                      • CopyRect.USER32(?,?), ref: 1007F560
                                                      • GetWindowRect.USER32(00000000,?), ref: 1007F569
                                                      • CopyRect.USER32(?,?), ref: 1007F585
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect$Window$Copy$Long$MessageParentSend
                                                      • String ID: ($@
                                                      • API String ID: 808654186-1311469180
                                                      • Opcode ID: cab02e146a93c80570c466e49ac60398709aab32dc1262747ccbbdef7fe98923
                                                      • Instruction ID: 906ee3ec19856e23d9d97c98cbfabd87b2b8a856754ec1fb3eaa4367732b694f
                                                      • Opcode Fuzzy Hash: cab02e146a93c80570c466e49ac60398709aab32dc1262747ccbbdef7fe98923
                                                      • Instruction Fuzzy Hash: 89515F72E00619AFDB11DFA8CC85EEEBBF9EF44350F158119EA41F3291DA34E9058B64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 1007DF53: GetWindowTextLengthA.USER32(?), ref: 1007DF60
                                                        • Part of subcall function 1007DF53: GetWindowTextA.USER32(?,00000000,00000000), ref: 1007DF78
                                                      • __ftol.LIBCMT ref: 1005B086
                                                      • __ftol.LIBCMT ref: 1005B0DC
                                                      • __ftol.LIBCMT ref: 1005B132
                                                      • __ftol.LIBCMT ref: 1005B188
                                                      • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 1005B1A9
                                                      • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 1005B1C3
                                                      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 1005B28B
                                                      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 1005B2BD
                                                      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 1005B2DA
                                                      • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 1005B2FA
                                                      • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 1005B314
                                                      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 1005B32C
                                                      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 1005B34B
                                                      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 1005B3B4
                                                      • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 1005B419
                                                      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 1005B45B
                                                        • Part of subcall function 1007FD17: GetDlgItem.USER32(?,?), ref: 1007FD25
                                                      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 1005B487
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$__ftol$TextWindow$ItemLength
                                                      • String ID:
                                                      • API String ID: 2143175130-0
                                                      • Opcode ID: ac908b0d2609d8e74ac75cdf1d4c1c696739145b9ce6f9bf9de6bf77d096399e
                                                      • Instruction ID: 1ddf9531846f283b40cb29caab98585c2805c9c97a34c3aca09911f495d6c853
                                                      • Opcode Fuzzy Hash: ac908b0d2609d8e74ac75cdf1d4c1c696739145b9ce6f9bf9de6bf77d096399e
                                                      • Instruction Fuzzy Hash: 13D1B0B6A44F06ABD320DB70CC82FAB73A4EB40740F10892DF5AA962D1DA74F549CF45
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LoadLibraryA.KERNEL32(?,?,100CE648,?,?,?,?,?,?,?,00000000,100CE570,00000000), ref: 10034726
                                                      • LoadLibraryA.KERNEL32(?,?,00000000,?,?,100CE640,100B4230,?,?,?,?,?,?,00000000,100CE570,00000000), ref: 10034763
                                                      • GetProcAddress.KERNEL32(00000000,DllRegisterServer), ref: 10034799
                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,00000000,100CE570,00000000), ref: 100347A4
                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,00000000,100CE570,00000000), ref: 100347B2
                                                      • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,00000000,100CE570,00000000), ref: 100348B1
                                                      • LoadTypeLib.OLEAUT32(?,00000000), ref: 100348D5
                                                      • lstrlenA.KERNEL32(?,?,?,?,?,?,?,00000000,100CE570,00000000), ref: 1003492B
                                                      • RegisterTypeLib.OLEAUT32(00000000,?,00000000), ref: 1003494E
                                                      • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,100CE570,00000000), ref: 100349B1
                                                      • CLSIDFromString.OLE32(00000000,00000000,?,00000000,00000001,?,?,?,?,?,?,?,?,?,00000000,100CE570), ref: 100349D6
                                                      • UnRegisterTypeLib.OLEAUT32(00000000,?,00000000,00000000,00000001), ref: 100349FC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Library$LoadTypelstrlen$FreeRegister$AddressFromProcString
                                                      • String ID: DllRegisterServer$DllUnregisterServer
                                                      • API String ID: 2572237918-2931954178
                                                      • Opcode ID: 50e39aa81b35b472a98e85ec307c5b709620776737d3959f0b3b11faffeaebff
                                                      • Instruction ID: d9c32e6c2478b223396ac430ed653f0d4bfd187639594bf8b3df6de746d90e64
                                                      • Opcode Fuzzy Hash: 50e39aa81b35b472a98e85ec307c5b709620776737d3959f0b3b11faffeaebff
                                                      • Instruction Fuzzy Hash: 9CB1AF79A006599FDB11CFA4C885FAF77A8EF45210F128529F915EF281EB34BE05C7A0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(USER32,?,?,?,1006B248), ref: 1006B131
                                                      • GetProcAddress.KERNEL32(00000000,GetSystemMetrics), ref: 1006B149
                                                      • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 1006B15A
                                                      • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 1006B16B
                                                      • GetProcAddress.KERNEL32(00000000,MonitorFromPoint), ref: 1006B17C
                                                      • GetProcAddress.KERNEL32(00000000,EnumDisplayMonitors), ref: 1006B18D
                                                      • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 1006B19E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleModule
                                                      • String ID: EnumDisplayMonitors$GetMonitorInfoA$GetSystemMetrics$MonitorFromPoint$MonitorFromRect$MonitorFromWindow$USER32
                                                      • API String ID: 667068680-2376520503
                                                      • Opcode ID: 078642c0e2bb43ef549cedad0a6fa73c2b5728e4a8d5c0eed283f055e1dfba6e
                                                      • Instruction ID: 56f02a8332746d3e4523525ce9e002353d032efa08e353d3542edacc88aefffd
                                                      • Opcode Fuzzy Hash: 078642c0e2bb43ef549cedad0a6fa73c2b5728e4a8d5c0eed283f055e1dfba6e
                                                      • Instruction Fuzzy Hash: FA1126B0900621ABE351DFA5ACC0A69BBE6F7496C0BA1443FED0CD6120DB749686CB71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 100826D0: __EH_prolog.LIBCMT ref: 100826D5
                                                        • Part of subcall function 100826D0: BeginPaint.USER32(?,?,?,?,10026739), ref: 100826FE
                                                        • Part of subcall function 1005B8F0: GetWindowExtEx.GDI32(?,?), ref: 1005B913
                                                      • MulDiv.KERNEL32(?,00000064,?), ref: 1005C41B
                                                      • GetClientRect.USER32(?,?), ref: 1005C4A9
                                                      • DPtoLP.GDI32(?,?,00000002), ref: 1005C4BE
                                                      • OffsetRect.USER32 ref: 1005C50D
                                                      • Rectangle.GDI32(?,?,?,?,?), ref: 1005C54B
                                                      • FillRect.USER32(?,?,?), ref: 1005C5A3
                                                      • FillRect.USER32(?,00000032,?), ref: 1005C5E6
                                                      • LPtoDP.GDI32(?,?,00000002), ref: 1005C68F
                                                      • IsRectEmpty.USER32(?), ref: 1005C696
                                                      • CreateRectRgnIndirect.GDI32(?), ref: 1005C6DA
                                                        • Part of subcall function 10082291: SelectClipRgn.GDI32(?,00000000), ref: 100822B3
                                                        • Part of subcall function 10082291: SelectClipRgn.GDI32(?,?), ref: 100822C9
                                                      • LPtoDP.GDI32(?,?,00000001), ref: 1005C71A
                                                      • DPtoLP.GDI32(?,?,00000001), ref: 1005C741
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect$ClipFillSelect$BeginClientCreateEmptyH_prologIndirectOffsetPaintRectangleWindow
                                                      • String ID: 2
                                                      • API String ID: 2521159323-450215437
                                                      • Opcode ID: 065b3ebe17877d9d747e7f07ea2a08c5c6896903f1d44b790092a89c6ec3ae33
                                                      • Instruction ID: 1f99a5de97071e001c86f59f6b1b8cfd86b6542a4840ef5468fa0ee5ba7878ca
                                                      • Opcode Fuzzy Hash: 065b3ebe17877d9d747e7f07ea2a08c5c6896903f1d44b790092a89c6ec3ae33
                                                      • Instruction Fuzzy Hash: F5E107756087459FD324CF68C890A6BB7E9FBC8700F408A2DF59A87391DB70E909CB52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetProfileStringA.KERNEL32(windows,device,,,,,?,000001F4), ref: 10048A9F
                                                      • GetProfileStringA.KERNEL32(devices,00000000,100C2494,?,00001000), ref: 10048AD3
                                                      • GetProfileStringA.KERNEL32(devices,?,,,,,?,000000C8), ref: 10048B5A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ProfileString
                                                      • String ID: ,,,$device$devices$none$windows
                                                      • API String ID: 1468043044-528626633
                                                      • Opcode ID: 2cc17e71c826527a1326a0efe5920761f2244e28727d4da94c85c6eb3dde8826
                                                      • Instruction ID: 91f77faa8d90a5d0a241e8931d03584b3cc788c585df5d1ede48eeb528213437
                                                      • Opcode Fuzzy Hash: 2cc17e71c826527a1326a0efe5920761f2244e28727d4da94c85c6eb3dde8826
                                                      • Instruction Fuzzy Hash: 48B1D1781083819FD324DB64C881BDFB7E8EF99354F504E1DF99983291EB74AA04CB66
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 100856DB: TlsGetValue.KERNEL32(100D0D34,?,?,10085121,10084A20,1008513D,100813C9,1006A835,?,1006B749,?,?,?,?,?,?), ref: 1008571A
                                                      • RegisterClipboardFormatA.USER32(commdlg_LBSelChangedNotify), ref: 1007A1D2
                                                      • RegisterClipboardFormatA.USER32(commdlg_ShareViolation), ref: 1007A1DE
                                                      • RegisterClipboardFormatA.USER32(commdlg_FileNameOK), ref: 1007A1EA
                                                      • RegisterClipboardFormatA.USER32(commdlg_ColorOK), ref: 1007A1F6
                                                      • RegisterClipboardFormatA.USER32(commdlg_help), ref: 1007A202
                                                      • RegisterClipboardFormatA.USER32(commdlg_SetRGBColor), ref: 1007A20E
                                                        • Part of subcall function 1007FCAE: SetWindowLongA.USER32(?,000000FC,00000000), ref: 1007FCDD
                                                      • SendMessageA.USER32(?,00000111,0000E146,00000000), ref: 1007A301
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ClipboardFormatRegister$LongMessageSendValueWindow
                                                      • String ID: commdlg_ColorOK$commdlg_FileNameOK$commdlg_LBSelChangedNotify$commdlg_SetRGBColor$commdlg_ShareViolation$commdlg_help
                                                      • API String ID: 3913284445-3888057576
                                                      • Opcode ID: 1108bec500b7126c395c9cf8de6adf55ee7fd956614e3c7233850fb165a9d9ea
                                                      • Instruction ID: c4966bbb67f502b5c98c354dca102f0d957ebab90c1c5546f48f89bd103da583
                                                      • Opcode Fuzzy Hash: 1108bec500b7126c395c9cf8de6adf55ee7fd956614e3c7233850fb165a9d9ea
                                                      • Instruction Fuzzy Hash: E541E630A00255EBEB21DFA8CC84ADE3FE1FB85390F018416FD8557152DB7958D1CBA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 1003DC00: EnumDisplaySettingsA.USER32(00000000,000000FF,?), ref: 1003DC0F
                                                      • SetStretchBltMode.GDI32(?,00000000), ref: 100431B4
                                                      • CreateCompatibleDC.GDI32(?), ref: 10043239
                                                      • CreateCompatibleDC.GDI32(?), ref: 10043251
                                                      • GetObjectA.GDI32(?,00000018,?), ref: 10043292
                                                      • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 100432A8
                                                      • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 10043306
                                                      • StretchBlt.GDI32(?,000000FF,?,?,?,?,00000000,00000000,?,?,00660046), ref: 1004335F
                                                      • StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000000,?,?,008800C6), ref: 10043399
                                                      • StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000000,?,?,00660046), ref: 100433D3
                                                      • CreateCompatibleDC.GDI32(?), ref: 1004344B
                                                      • SelectObject.GDI32(00000000,?), ref: 10043458
                                                      • StretchBlt.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?), ref: 1004349B
                                                      • SelectObject.GDI32(00000000,?), ref: 100434A7
                                                      • DeleteDC.GDI32(00000000), ref: 100434AE
                                                      • DrawIconEx.USER32(?,?,?,?,?,?,00000000,00000000,00000003), ref: 100434ED
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Stretch$Create$CompatibleObject$Select$BitmapDeleteDisplayDrawEnumIconModeSettings
                                                      • String ID:
                                                      • API String ID: 1298110373-0
                                                      • Opcode ID: 3c79cdb806edbdb15ec2fa4a6aadddc1777b6733486608f7f225d520fab42bf8
                                                      • Instruction ID: 80a8934b419113055ded6e0244794c4a2af820fa4d15cded1102642b999fdf10
                                                      • Opcode Fuzzy Hash: 3c79cdb806edbdb15ec2fa4a6aadddc1777b6733486608f7f225d520fab42bf8
                                                      • Instruction Fuzzy Hash: 81B13875644705AFE210DB64CC85F6BB3E9FF88750F208A19FAA5C7290DB34ED058B62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CopyRect.USER32(?,?), ref: 100550B6
                                                        • Part of subcall function 100828CD: __EH_prolog.LIBCMT ref: 100828D2
                                                        • Part of subcall function 100828CD: CreateSolidBrush.GDI32(?), ref: 100828EF
                                                      • FillRect.USER32(?,?,00000000), ref: 100550F4
                                                      • GetSystemMetrics.USER32(0000002E), ref: 1005511D
                                                      • GetSystemMetrics.USER32(0000002D), ref: 10055123
                                                      • DrawFrameControl.USER32(?,?,00000003,?), ref: 10055196
                                                      • DrawEdge.USER32(?,?,0000000A,0000000F), ref: 100551A9
                                                      • InflateRect.USER32(?,00FFFFFD,00000001), ref: 100551C4
                                                      • GetSysColor.USER32(0000000F), ref: 100551E8
                                                      • Rectangle.GDI32(?,?,?,?,?), ref: 1005523B
                                                      • OffsetRect.USER32(?,00000001,00000001), ref: 100552A5
                                                      • GetSysColor.USER32(00000014), ref: 100552AB
                                                      • OffsetRect.USER32(?,000000FF,000000FF), ref: 100552D3
                                                      • GetSysColor.USER32(00000010), ref: 100552D9
                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 10055322
                                                      • DrawFocusRect.USER32(?,?), ref: 10055331
                                                        • Part of subcall function 1007DF53: GetWindowTextLengthA.USER32(?), ref: 1007DF60
                                                        • Part of subcall function 1007DF53: GetWindowTextA.USER32(?,00000000,00000000), ref: 1007DF78
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect$ColorDraw$InflateMetricsOffsetSystemTextWindow$BrushControlCopyCreateEdgeFillFocusFrameH_prologLengthRectangleSolid
                                                      • String ID:
                                                      • API String ID: 4239342997-0
                                                      • Opcode ID: 8b5f8d55c81a5b0531a47390e37b01ed2cb35ef7a9234c8eaa63a81dc0be2ce7
                                                      • Instruction ID: cf4e8067966cd767497c10ac15301611af47063cfbf6a52a2a2a089235df01d2
                                                      • Opcode Fuzzy Hash: 8b5f8d55c81a5b0531a47390e37b01ed2cb35ef7a9234c8eaa63a81dc0be2ce7
                                                      • Instruction Fuzzy Hash: A6A18774608745AFD704DF68C889E6ABBE8FF88714F004A1DF59687391DBB0E905CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 10057DFB
                                                      • CreateSemaphoreA.KERNEL32(00000000,00000014,00000014,00000000), ref: 10057E10
                                                      • InitializeCriticalSection.KERNEL32(?), ref: 10057E3B
                                                      • CreateThread.KERNEL32(00000000,00000000,10058070,?,00000004,?), ref: 10057E70
                                                      • EnterCriticalSection.KERNEL32(100CF000), ref: 10057E82
                                                      • LeaveCriticalSection.KERNEL32(100CF000,-000000FC,00000000,00000000), ref: 10058035
                                                      • ResumeThread.KERNEL32(?), ref: 10058043
                                                      • ReleaseSemaphore.KERNEL32(?,00000014,00000000), ref: 10058055
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CreateCriticalSection$SemaphoreThread$EnterEventInitializeLeaveReleaseResume
                                                      • String ID: RIFF$WAVE$data$fmt
                                                      • API String ID: 1802393137-4212202414
                                                      • Opcode ID: 39d9d8be6554f1c4a1d4c79169dfa163571eee9efc8117db6e44d38f106135f2
                                                      • Instruction ID: f08c05ec3de21ae2e4911a343ab08a6c2fbec0e578bd7ee143a4483f3e273d94
                                                      • Opcode Fuzzy Hash: 39d9d8be6554f1c4a1d4c79169dfa163571eee9efc8117db6e44d38f106135f2
                                                      • Instruction Fuzzy Hash: 28B1E1B5A003109BD314CB24DC85B6F73E5FB88714F154A2DF94AA7381E674EE098BA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a6bea19dc9f58eaae381589bb250e56b0f5b5eaeb813d5aede39e4a32cc7c49e
                                                      • Instruction ID: 8da37386487db982871031380d771079b7483ce5c984e68869e2947af36ab6cd
                                                      • Opcode Fuzzy Hash: a6bea19dc9f58eaae381589bb250e56b0f5b5eaeb813d5aede39e4a32cc7c49e
                                                      • Instruction Fuzzy Hash: 44D18C75604B419FD724CF24D8C2E2BB7E5EB48398FA18A2DE596D76A0D730EC44CB12
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetCapture.USER32 ref: 1004F56E
                                                      • SetCapture.USER32(?,?,?,?,?,?,?,?,?,10088FE8,000000FF,1004EDAD,?,?,?,?), ref: 1004F58B
                                                        • Part of subcall function 10082568: __EH_prolog.LIBCMT ref: 1008256D
                                                        • Part of subcall function 10082568: GetDC.USER32(?), ref: 10082596
                                                        • Part of subcall function 1005B8F0: GetWindowExtEx.GDI32(?,?), ref: 1005B913
                                                        • Part of subcall function 10082496: GetWindowExtEx.GDI32(?,?), ref: 100824A7
                                                        • Part of subcall function 10082496: GetViewportExtEx.GDI32(?,?), ref: 100824B4
                                                        • Part of subcall function 10082496: MulDiv.KERNEL32(?,00000000,00000000), ref: 100824D9
                                                        • Part of subcall function 10082496: MulDiv.KERNEL32(?,00000000,00000000), ref: 100824F4
                                                        • Part of subcall function 10082027: SetMapMode.GDI32(?,?), ref: 10082040
                                                        • Part of subcall function 10082027: SetMapMode.GDI32(?,?), ref: 1008204E
                                                        • Part of subcall function 10081F9C: SetROP2.GDI32(?,?), ref: 10081FB5
                                                        • Part of subcall function 10081F9C: SetROP2.GDI32(?,?), ref: 10081FC3
                                                        • Part of subcall function 10081F40: SetBkMode.GDI32(?,?), ref: 10081F59
                                                        • Part of subcall function 10081F40: SetBkMode.GDI32(?,?), ref: 10081F67
                                                        • Part of subcall function 1008287D: __EH_prolog.LIBCMT ref: 10082882
                                                        • Part of subcall function 1008287D: CreatePen.GDI32(?,?,?), ref: 100828A5
                                                        • Part of subcall function 10081E64: SelectObject.GDI32(10023605,00000000), ref: 10081E86
                                                        • Part of subcall function 10081E64: SelectObject.GDI32(10023605,?), ref: 10081E9C
                                                      • GetCapture.USER32 ref: 1004F651
                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 1004F670
                                                      • DispatchMessageA.USER32(?), ref: 1004F6B1
                                                      • DispatchMessageA.USER32(?), ref: 1004F6CD
                                                      • ScreenToClient.USER32(?,?), ref: 1004F714
                                                      • GetCapture.USER32 ref: 1004F73C
                                                      • ReleaseCapture.USER32 ref: 1004F764
                                                      • ReleaseCapture.USER32 ref: 1004F7C0
                                                      • DPtoLP.GDI32 ref: 1004F804
                                                      • InvalidateRect.USER32(?,00000000,00000000,?,00000000,?,?,?,00000000,?,?,?), ref: 1004F88D
                                                      • InvalidateRect.USER32(?,00000000,00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 1004F91B
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Capture$Mode$Message$DispatchH_prologInvalidateObjectRectReleaseSelectWindow$ClientCreateScreenViewport
                                                      • String ID:
                                                      • API String ID: 453157188-0
                                                      • Opcode ID: 002bda473f37b5ea4713bc021751fa7ad1e28b97ffa6246b6b6a7704d6062307
                                                      • Instruction ID: 58892411d305a61d8647b1059f163ba7e40201e342948cc2685d297bab9d0b35
                                                      • Opcode Fuzzy Hash: 002bda473f37b5ea4713bc021751fa7ad1e28b97ffa6246b6b6a7704d6062307
                                                      • Instruction Fuzzy Hash: BCB16D75608740ABD314DB64C889E6FB7E9FF84700F204A2DF196C72A1DB34E944CB66
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,?), ref: 1002ACA8
                                                      • lstrcatA.KERNEL32(?,\shell\open\command,80000000,.htm,?,?,?,?), ref: 1002ACE7
                                                      • lstrlenA.KERNEL32(?), ref: 1002AD3C
                                                      • lstrcatA.KERNEL32(00000000,100B7DC4), ref: 1002AD85
                                                      • lstrcatA.KERNEL32(00000000,?), ref: 1002AD8D
                                                      • WinExec.KERNEL32(?,?), ref: 1002AD95
                                                        • Part of subcall function 1007BBAF: InterlockedDecrement.KERNEL32(-000000F4), ref: 1007BBC3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: lstrcat$DecrementExecExecuteInterlockedShelllstrlen
                                                      • String ID: "%1"$.htm$\shell\open\command$mailto:$open
                                                      • API String ID: 51986957-2182632014
                                                      • Opcode ID: c9ae27cc020adcd5fae59aa468e82c4b750093a3be1599f5aea8d87e4f7ee81c
                                                      • Instruction ID: ff561240b98bbd6e18d36998dc35d86d3fa10cf576a74afd43a6bd952c43a80e
                                                      • Opcode Fuzzy Hash: c9ae27cc020adcd5fae59aa468e82c4b750093a3be1599f5aea8d87e4f7ee81c
                                                      • Instruction Fuzzy Hash: 4E41C035504752ABD325DB24DC80F9BB7E8FF88750F444A1DFA9693280EB34B945CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • InflateRect.USER32(?,?,?), ref: 10042646
                                                        • Part of subcall function 10042370: SetRect.USER32(?,00000000,00000032,00000032,?), ref: 10042459
                                                        • Part of subcall function 10042370: OffsetRect.USER32(?,?,?), ref: 10042466
                                                        • Part of subcall function 10042370: IntersectRect.USER32(?,?,?), ref: 10042482
                                                        • Part of subcall function 10042370: IsRectEmpty.USER32(?), ref: 1004248D
                                                      • InflateRect.USER32(?,?,?), ref: 100426B9
                                                      • CreateRectRgn.GDI32(00000000,00000000,00000000,00000000), ref: 100428BD
                                                      • GetClipRgn.GDI32(?,00000000), ref: 100428CC
                                                      • CreatePolygonRgn.GDI32 ref: 1004294A
                                                      • SelectClipRgn.GDI32(?,?), ref: 10042A2D
                                                      • CreatePolygonRgn.GDI32(?,00000005,00000002), ref: 10042A50
                                                      • SelectClipRgn.GDI32(?,?), ref: 10042AD1
                                                      • DeleteObject.GDI32(?), ref: 10042AE7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect$ClipCreate$InflatePolygonSelect$DeleteEmptyIntersectObjectOffset
                                                      • String ID: gfff
                                                      • API String ID: 1105800552-1553575800
                                                      • Opcode ID: 3fb6a8b83a204a8975fc99a2a1727ae8fcecf520cdc0c069ea1d0e940a6f9293
                                                      • Instruction ID: 7a8b88fc0fd8f48b724f6793a221044bbc167aa5ea6b5fe4635d92de5bf6b753
                                                      • Opcode Fuzzy Hash: 3fb6a8b83a204a8975fc99a2a1727ae8fcecf520cdc0c069ea1d0e940a6f9293
                                                      • Instruction Fuzzy Hash: 03F1F4B46083419FD324CF69C980B5BBBE5FBC8740F508A2DF99987390EB70A945CB52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1007C984
                                                      • GetSystemMetrics.USER32(0000002A), ref: 1007CA35
                                                      • GlobalLock.KERNEL32(?,?,00000000,?,?), ref: 1007CABF
                                                      • CreateDialogIndirectParamA.USER32(?,?,?,Function_0007C7C7,00000000), ref: 1007CAF1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CreateDialogGlobalH_prologIndirectLockMetricsParamSystem
                                                      • String ID: Helv$MS Sans Serif$MS Shell Dlg
                                                      • API String ID: 2364537584-2894235370
                                                      • Opcode ID: 8ef3279addddcce843b3ad5ea6af33a58293dcf23e07990947804d621c6c838e
                                                      • Instruction ID: 2b3311d5d7e28a8ab183b836af485b5a5509120dec3c740f5a62e20bdec7cd1b
                                                      • Opcode Fuzzy Hash: 8ef3279addddcce843b3ad5ea6af33a58293dcf23e07990947804d621c6c838e
                                                      • Instruction Fuzzy Hash: 05613735D0024EEFCF05DFA4C886AEEBBB5FF08355F20812EE585A6191DB389A40CB55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetObjectA.GDI32(?,00000018,?), ref: 1004100D
                                                      • MulDiv.KERNEL32(?,?,00000064), ref: 10041042
                                                      • MulDiv.KERNEL32(?,?,00000064), ref: 1004106D
                                                      • GetDeviceCaps.GDI32 ref: 100410A7
                                                      • GetSystemPaletteEntries.GDI32(?,00000000,000000FF,00000004), ref: 100410E1
                                                      • CreatePalette.GDI32(00000000), ref: 100410EC
                                                      • CreateCompatibleBitmap.GDI32(?,?,?), ref: 1004114C
                                                      • CreateCompatibleDC.GDI32(?), ref: 1004117F
                                                      • CreateCompatibleDC.GDI32(?), ref: 100411B8
                                                      • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,?,?,00CC0020), ref: 1004121B
                                                      • GlobalFree.KERNEL32(00000000), ref: 100412E3
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Create$Compatible$Palette$BitmapCapsDeviceEntriesFreeGlobalObjectStretchSystem
                                                      • String ID:
                                                      • API String ID: 3563226738-0
                                                      • Opcode ID: 05a117452e740b11897cb92bace25f44285f094809eae238acee6d4edaf0a832
                                                      • Instruction ID: 449e30451c3a03492df51a9e457f6dc7fd30585583cf82bfe93dba89af362eaa
                                                      • Opcode Fuzzy Hash: 05a117452e740b11897cb92bace25f44285f094809eae238acee6d4edaf0a832
                                                      • Instruction Fuzzy Hash: 25919B75648385AFD310DB64C985B9FB7E8FB84A00F104A2DF695C3281DB74E9088B66
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetTextExtentPoint32A.GDI32(?,?,?,00000090), ref: 1005E5EF
                                                      • GetTextExtentPoint32A.GDI32(?,?,?,00000090), ref: 1005E614
                                                      • GetWindowRect.USER32(?,?), ref: 1005E69E
                                                      • SetRect.USER32(00000080,?,?,?,?), ref: 1005E6D3
                                                      • SetRect.USER32(00000070,?,?,?,?), ref: 1005E718
                                                      • SetRect.USER32(00000060,?,?,?,?), ref: 1005E78B
                                                      • GetSystemMetrics.USER32(00000001), ref: 1005E7B6
                                                      • GetSystemMetrics.USER32(00000000), ref: 1005E7BC
                                                      • OffsetRect.USER32(00000080,00000000,00000000), ref: 1005E7D4
                                                      • OffsetRect.USER32(00000080,00000000,00000000), ref: 1005E7E2
                                                      • OffsetRect.USER32(00000080,00000000,00000000), ref: 1005E7F4
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect$Offset$ExtentMetricsPoint32SystemText$Window
                                                      • String ID:
                                                      • API String ID: 1551820068-0
                                                      • Opcode ID: fbcf4af626c1ded15b5822d44759f077d7cd05f4154df4785d5d0c4ceb5ac886
                                                      • Instruction ID: 42a2fbdbf07942eb36e1aaee247283ce91246262c01222e315fa81bd827e0a96
                                                      • Opcode Fuzzy Hash: fbcf4af626c1ded15b5822d44759f077d7cd05f4154df4785d5d0c4ceb5ac886
                                                      • Instruction Fuzzy Hash: 5B911874600B059FD318CF69C985A6AF7E6FB88740F048A2DA996C7754EB74FC098B50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetClientRect.USER32(?,?), ref: 10055CFE
                                                      • FillRect.USER32(?,?,?), ref: 10055D62
                                                      • FillRect.USER32(?,?,?), ref: 10055DCE
                                                      • FillRect.USER32(?,?,?), ref: 10055E47
                                                      • CreateCompatibleDC.GDI32(?), ref: 10055E73
                                                      • SelectObject.GDI32(00000000,?), ref: 10055E89
                                                      • SetStretchBltMode.GDI32(?,00000000), ref: 10055EBD
                                                      • StretchBlt.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 10055EF4
                                                      • BitBlt.GDI32(?,00000000,?,?,?,00000000,00000000,00000000,00CC0020), ref: 10055F23
                                                        • Part of subcall function 100828CD: __EH_prolog.LIBCMT ref: 100828D2
                                                        • Part of subcall function 100828CD: CreateSolidBrush.GDI32(?), ref: 100828EF
                                                      • SelectObject.GDI32(00000000,00000000), ref: 10055F2B
                                                      • DeleteDC.GDI32(00000000), ref: 10055F38
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect$Fill$CreateObjectSelectStretch$BrushClientCompatibleDeleteH_prologModeSolid
                                                      • String ID:
                                                      • API String ID: 1645634290-0
                                                      • Opcode ID: 99486aa2103a26078f51813ef8ded0958c83055e1b33cc85631530bcda48bdfd
                                                      • Instruction ID: 1568768530efa701622848a827b2e661511014e2c8b2afc7c55510563f50630f
                                                      • Opcode Fuzzy Hash: 99486aa2103a26078f51813ef8ded0958c83055e1b33cc85631530bcda48bdfd
                                                      • Instruction Fuzzy Hash: 0D7126B5604745ABD624DF64C895F6BB7E8FB88241F204A1EF59AC3250D731E849CB22
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Mode$ColorCurrentObject$FillPolyStretchText
                                                      • String ID:
                                                      • API String ID: 544274770-0
                                                      • Opcode ID: ec2ea05afc5a29df5aef26d376fd3a1f34b3f1f4d1be55053c222f75c07fcae7
                                                      • Instruction ID: 2474d443e9b70bf069810bc1b90c1afd0adb570e7414953099b002a2ee5850a0
                                                      • Opcode Fuzzy Hash: ec2ea05afc5a29df5aef26d376fd3a1f34b3f1f4d1be55053c222f75c07fcae7
                                                      • Instruction Fuzzy Hash: 88513B75250B419BC764CBA0D988BABB3E5FF84741F610A2DE66B87261DB30BC46CB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 100826D0: __EH_prolog.LIBCMT ref: 100826D5
                                                        • Part of subcall function 100826D0: BeginPaint.USER32(?,?,?,?,10026739), ref: 100826FE
                                                      • GetClientRect.USER32(?,?), ref: 10054A1D
                                                      • CreateCompatibleBitmap.GDI32 ref: 10054A52
                                                      • CreateCompatibleDC.GDI32(?), ref: 10054A82
                                                        • Part of subcall function 10081E11: SelectObject.GDI32(?,?), ref: 10081E19
                                                      • PatBlt.GDI32(?,00000000,00000000,?,?,00000042), ref: 10054ABA
                                                      • GetObjectA.GDI32(00000000,00000018,?), ref: 10054AD5
                                                      • CreateCompatibleDC.GDI32(?), ref: 10054AE0
                                                      • SelectObject.GDI32(00000000,00000000), ref: 10054AF0
                                                      • BitBlt.GDI32(?,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 10054B13
                                                      • SelectObject.GDI32(00000000,?), ref: 10054B1F
                                                      • DeleteDC.GDI32(00000000), ref: 10054B22
                                                      • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 10054B4B
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Object$CompatibleCreateSelect$BeginBitmapClientDeleteH_prologPaintRect
                                                      • String ID:
                                                      • API String ID: 1593221388-0
                                                      • Opcode ID: 59e3fe5ae9f40d9bf78820f30998d3f45afb3db893089255170cae1f90320c54
                                                      • Instruction ID: 7f959c4814083113a9c696fac5f19f48fc54e8654b2a7011c2e1ac51d166b92b
                                                      • Opcode Fuzzy Hash: 59e3fe5ae9f40d9bf78820f30998d3f45afb3db893089255170cae1f90320c54
                                                      • Instruction Fuzzy Hash: A0510775608345AFE310DFA4CC85F6BBBE8FB89740F044A1EF69587291DB74E8048B62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1007D68B
                                                      • GetPropA.USER32(?,AfxOldWndProc423), ref: 1007D6A3
                                                      • CallWindowProcA.USER32(?,?,00000110,?,00000000), ref: 1007D701
                                                        • Part of subcall function 1007D26E: GetWindowRect.USER32(?,?), ref: 1007D293
                                                        • Part of subcall function 1007D26E: GetWindow.USER32(?,00000004), ref: 1007D2B0
                                                      • SetWindowLongA.USER32(?,000000FC,?), ref: 1007D731
                                                      • RemovePropA.USER32(?,AfxOldWndProc423), ref: 1007D739
                                                      • GlobalFindAtomA.KERNEL32(AfxOldWndProc423), ref: 1007D740
                                                      • GlobalDeleteAtom.KERNEL32(00000000), ref: 1007D747
                                                        • Part of subcall function 1007D24B: GetWindowRect.USER32(?,?), ref: 1007D257
                                                      • CallWindowProcA.USER32(?,?,?,?,00000000), ref: 1007D79B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Window$AtomCallGlobalProcPropRect$DeleteFindH_prologLongRemove
                                                      • String ID: AfxOldWndProc423
                                                      • API String ID: 2397448395-1060338832
                                                      • Opcode ID: 2eb377466efcd16181cb2c65cdc4904ed59a8fb09fd93e66e76f05e15b8a5b80
                                                      • Instruction ID: 675b30e0edebf44f0268d12377e38b9b8d4c210f414fbad8a91bf7781316e254
                                                      • Opcode Fuzzy Hash: 2eb377466efcd16181cb2c65cdc4904ed59a8fb09fd93e66e76f05e15b8a5b80
                                                      • Instruction Fuzzy Hash: 72318E3380051AABDB02EFA4CD89EBF7BB8FF49350F008116F941A2151D7399A11DBA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 100826D0: __EH_prolog.LIBCMT ref: 100826D5
                                                        • Part of subcall function 100826D0: BeginPaint.USER32(?,?,?,?,10026739), ref: 100826FE
                                                        • Part of subcall function 10082281: GetClipBox.GDI32(?,?), ref: 10082288
                                                      • IsRectEmpty.USER32(?), ref: 10027097
                                                      • GetClientRect.USER32(?,?), ref: 100270AF
                                                      • InflateRect.USER32(?,?,?), ref: 1002716D
                                                      • IntersectRect.USER32(?,?,?), ref: 100271D7
                                                      • CreateRectRgn.GDI32(?,?,?,?), ref: 100271F1
                                                      • FillRgn.GDI32(?,?,?), ref: 100273A6
                                                      • GetCurrentObject.GDI32(?,00000006), ref: 10027425
                                                        • Part of subcall function 10081E28: GetStockObject.GDI32(?), ref: 10081E31
                                                        • Part of subcall function 10081E28: SelectObject.GDI32(10023605,00000000), ref: 10081E4B
                                                        • Part of subcall function 10081E28: SelectObject.GDI32(10023605,00000000), ref: 10081E56
                                                      • OffsetRect.USER32(?,00000001,00000001), ref: 10027503
                                                      • OffsetRect.USER32(?,00000002,00000002), ref: 10027597
                                                      • OffsetRect.USER32(?,00000001,00000001), ref: 1002754A
                                                        • Part of subcall function 10081FF8: SetTextColor.GDI32(?,?), ref: 10082012
                                                        • Part of subcall function 10081FF8: SetTextColor.GDI32(?,?), ref: 10082020
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect$Object$Offset$ColorSelectText$BeginClientClipCreateCurrentEmptyFillH_prologInflateIntersectPaintStock
                                                      • String ID:
                                                      • API String ID: 4264835570-0
                                                      • Opcode ID: 26c54ae7396d20160c302b5ba1a2219fbbd8b0f257ea447ca556743babe87c0f
                                                      • Instruction ID: fc214b45323cfdfb4b5b75736236ef072ecd214a4972e475305ee07d3bcb208e
                                                      • Opcode Fuzzy Hash: 26c54ae7396d20160c302b5ba1a2219fbbd8b0f257ea447ca556743babe87c0f
                                                      • Instruction Fuzzy Hash: 74024675508781DFD324DF64D884AABB7E9FB98300F804D1EF59A87291DB70A948CB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetClientRect.USER32(?,?), ref: 1002E24F
                                                      • CreateCompatibleBitmap.GDI32 ref: 1002E2AB
                                                      • CreateCompatibleDC.GDI32(?), ref: 1002E2DB
                                                      • CreateRectRgn.GDI32(00000000,00000000,00000001,?), ref: 1002E370
                                                      • SetRect.USER32(?,00000000,00000000,00000001,?), ref: 1002E399
                                                        • Part of subcall function 10026CA0: __ftol.LIBCMT ref: 10026DB9
                                                        • Part of subcall function 10026CA0: __ftol.LIBCMT ref: 10026DC6
                                                      • FillRgn.GDI32(?,?,?), ref: 1002E40C
                                                      • PatBlt.GDI32(?,00000000,00000000,00000001,?,00F00021), ref: 1002E47F
                                                        • Part of subcall function 10022AC0: GetSysColor.USER32(0000000F), ref: 10022ACD
                                                        • Part of subcall function 100828CD: __EH_prolog.LIBCMT ref: 100828D2
                                                        • Part of subcall function 100828CD: CreateSolidBrush.GDI32(?), ref: 100828EF
                                                      • GetObjectA.GDI32(?,00000018,?), ref: 1002E4FB
                                                      • CreateCompatibleDC.GDI32(?), ref: 1002E539
                                                      • BitBlt.GDI32(?,00000000,00000000,00000001,?,?,00000000,00000000,00CC0020), ref: 1002E598
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Create$CompatibleRect$__ftol$BitmapBrushClientColorFillH_prologObjectSolid
                                                      • String ID:
                                                      • API String ID: 2289681609-0
                                                      • Opcode ID: ab678101eb60dbe8cdb9868d31b360980c2c88d869d8f6573067d97bed0c41a3
                                                      • Instruction ID: d12db7735a3d685eab04fe8a266720eb61e6167095e58e43a8fb11a943111018
                                                      • Opcode Fuzzy Hash: ab678101eb60dbe8cdb9868d31b360980c2c88d869d8f6573067d97bed0c41a3
                                                      • Instruction Fuzzy Hash: F8C18971648781AFD320DB64C885BABB7E8FF94744F50491EF58683291EB74ED08CB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateSolidBrush.GDI32(00FFFFFF), ref: 1003FF6F
                                                      • GetWindowRect.USER32(?), ref: 1003FF99
                                                      • GetStockObject.GDI32(00000005), ref: 1003FFC7
                                                      • LoadCursorA.USER32(00000000,00007F00), ref: 1003FFD5
                                                      • GetWindowRect.USER32(?,?), ref: 10040043
                                                      • GetWindowRect.USER32(?,?), ref: 10040054
                                                      • GetWindowRect.USER32(?,?), ref: 10040069
                                                      • GetSystemMetrics.USER32(00000001), ref: 1004007F
                                                      • GetWindowRect.USER32(?,?), ref: 1004010A
                                                      • OffsetRect.USER32(?,00000000,00000001), ref: 10040124
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect$Window$BrushCreateCursorLoadMetricsObjectOffsetSolidStockSystem
                                                      • String ID:
                                                      • API String ID: 3805611468-0
                                                      • Opcode ID: 457caf44835d76b86caf013e44adea51abfca9bd96e6dc2f6537fbb8eb3e49bf
                                                      • Instruction ID: 3c2a23d3472a8c307eff2193a37f3ae6695efe1e6573293019a65e4c160d6388
                                                      • Opcode Fuzzy Hash: 457caf44835d76b86caf013e44adea51abfca9bd96e6dc2f6537fbb8eb3e49bf
                                                      • Instruction Fuzzy Hash: 0AA1AB706047029FD325CF64C895F7BB7E5EB84704F10892DF2AA8B291EB78E805CB55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetProcAddress.KERNEL32(00000000,100BE274), ref: 10033F07
                                                      • LoadLibraryA.KERNEL32(?,?,100CE74C), ref: 10033FF7
                                                      • LoadLibraryA.KERNEL32(?,?), ref: 1003403D
                                                      • LoadLibraryA.KERNEL32(?,?,100CE648,00000001), ref: 10034085
                                                      • LoadLibraryA.KERNEL32(00000001), ref: 1003409B
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 100340AD
                                                      • FreeLibrary.KERNEL32(00000000), ref: 10034140
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Library$Load$AddressProc$Free
                                                      • String ID:
                                                      • API String ID: 3120990465-0
                                                      • Opcode ID: 1d9631da552c74a10a41da46c47218e54381ed8c66164aac2fc824398a9adee9
                                                      • Instruction ID: 11851d00a4f6fe415bfa86c7ea2389771886453dd49608626ebb77f584412e8b
                                                      • Opcode Fuzzy Hash: 1d9631da552c74a10a41da46c47218e54381ed8c66164aac2fc824398a9adee9
                                                      • Instruction Fuzzy Hash: C4A1B279A00742AFD315DF64C880B9BB3E8FF89311F058A29F9599B241EB34F905CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 100826D0: __EH_prolog.LIBCMT ref: 100826D5
                                                        • Part of subcall function 100826D0: BeginPaint.USER32(?,?,?,?,10026739), ref: 100826FE
                                                        • Part of subcall function 10082281: GetClipBox.GDI32(?,?), ref: 10082288
                                                      • GetClientRect.USER32(?,?), ref: 1002DE4E
                                                      • IntersectRect.USER32(?,?,?), ref: 1002DE66
                                                      • IsRectEmpty.USER32(?), ref: 1002DE96
                                                      • GetObjectA.GDI32(?,00000018,?), ref: 1002DECD
                                                      • CreateCompatibleDC.GDI32(?), ref: 1002DEF3
                                                      • IntersectRect.USER32(?,?,?), ref: 1002DF48
                                                      • IsRectEmpty.USER32(?), ref: 1002DF53
                                                      • BitBlt.GDI32(?,?,?,?,?,?,?,?,00CC0020), ref: 1002DF91
                                                      • DPtoLP.GDI32(?,?,00000002), ref: 1002E016
                                                      • IsWindow.USER32(?), ref: 1002E078
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect$EmptyIntersect$BeginClientClipCompatibleCreateH_prologObjectPaintWindow
                                                      • String ID:
                                                      • API String ID: 29348440-0
                                                      • Opcode ID: b4e3d5742309ea0476c805f5455c9afecec71d23743f5d9b8cbd7fc314fa14ca
                                                      • Instruction ID: 601ce35a7fd0d1f0472e3ea97ede89cc4e907cbe5d00829712453e298cbd4bc4
                                                      • Opcode Fuzzy Hash: b4e3d5742309ea0476c805f5455c9afecec71d23743f5d9b8cbd7fc314fa14ca
                                                      • Instruction Fuzzy Hash: 5181F8B55087459FD324DF65C984AABB7E9FF88700F108E2EF59A83251D730A909CB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetWindowRect.USER32(?,?), ref: 1003E6DD
                                                      • GetWindowRect.USER32(?,?), ref: 1003E6EC
                                                      • IntersectRect.USER32(?,?,?), ref: 1003E745
                                                      • EqualRect.USER32(?,?), ref: 1003E775
                                                      • GetWindowRect.USER32(?,?), ref: 1003E793
                                                      • OffsetRect.USER32(?,?,?), ref: 1003E80A
                                                      • OffsetRect.USER32(?,?,00000000), ref: 1003E824
                                                      • OffsetRect.USER32(?,?,00000000), ref: 1003E83C
                                                      • OffsetRect.USER32(?,00000000,?), ref: 1003E856
                                                      • OffsetRect.USER32(?,00000000,?), ref: 1003E86E
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect$Offset$Window$EqualIntersect
                                                      • String ID:
                                                      • API String ID: 2638238157-0
                                                      • Opcode ID: 5ef5f153171b9c786318bb599402375f294f855ac002ce5f2a7d44b73ab16b1e
                                                      • Instruction ID: a4c6f9b3069277b1b111f450469a98d801d9947f76c75037579a79f9432281a3
                                                      • Opcode Fuzzy Hash: 5ef5f153171b9c786318bb599402375f294f855ac002ce5f2a7d44b73ab16b1e
                                                      • Instruction Fuzzy Hash: 205109B56083469FD708CF28C98096FBBE9EFC8744F004A2EF985D7254EA70ED458B52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetSystemMetrics.USER32(0000002E), ref: 10055441
                                                      • GetSystemMetrics.USER32(0000002D), ref: 10055447
                                                      • GetSystemMetrics.USER32(0000000A), ref: 1005544D
                                                      • GetSystemMetrics.USER32(0000000A), ref: 10055458
                                                      • GetSystemMetrics.USER32(00000009), ref: 10055466
                                                      • GetSystemMetrics.USER32(00000009), ref: 10055472
                                                      • GetWindowRect.USER32(?,?), ref: 10055497
                                                      • GetParent.USER32(?), ref: 1005549D
                                                      • GetWindowRect.USER32(?,00000000), ref: 100554C2
                                                      • SetRect.USER32(?,?,00000000,?,?), ref: 100554F4
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MetricsSystem$Rect$Window$Parent
                                                      • String ID:
                                                      • API String ID: 3457858938-0
                                                      • Opcode ID: 4b384f716970f3ed71b7c7fe14ef43cb7f252efb0ff1bba38dae3f05f1ee80b3
                                                      • Instruction ID: 19265ee5575b8b3b271488270f1d095e58628dddfd7ff2fdd656af5742573461
                                                      • Opcode Fuzzy Hash: 4b384f716970f3ed71b7c7fe14ef43cb7f252efb0ff1bba38dae3f05f1ee80b3
                                                      • Instruction Fuzzy Hash: FC21A3B1A0431A6FD704DF64DC9492E77A9FBC4641F00492EF945D3280DBB4ED098BA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetStockObject.GDI32(00000011), ref: 10081B08
                                                      • GetStockObject.GDI32(0000000D), ref: 10081B10
                                                      • GetObjectA.GDI32(00000000,0000003C,?), ref: 10081B1D
                                                      • GetDC.USER32(00000000), ref: 10081B2C
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 10081B43
                                                      • MulDiv.KERNEL32(?,00000048,00000000), ref: 10081B4F
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 10081B5A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Object$Stock$CapsDeviceRelease
                                                      • String ID: System
                                                      • API String ID: 46613423-3470857405
                                                      • Opcode ID: 31e45e07582491fabfa3496dcaedb10dadd51bb04966bf2f24579277c8efddf6
                                                      • Instruction ID: 50283395766b2acb6985ef67d0c400ccd6014df1bdfadb658be9dc0fad969eef
                                                      • Opcode Fuzzy Hash: 31e45e07582491fabfa3496dcaedb10dadd51bb04966bf2f24579277c8efddf6
                                                      • Instruction Fuzzy Hash: 7D113031E00729ABEB019BA5CC59FAE7BACFF15780F004016F605EB191E7B09D418BA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,10070057,?,Microsoft Visual C++ Runtime Library,00012010,?,100AA2F8,?,100AA348,?,?,?,Runtime Error!Program: ), ref: 10076E69
                                                      • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 10076E81
                                                      • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 10076E92
                                                      • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 10076E9F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$LibraryLoad
                                                      • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                                      • API String ID: 2238633743-4044615076
                                                      • Opcode ID: c73522a68df74b23a811ebd18b02dbce82a97bc164b6864a54603efb8e306421
                                                      • Instruction ID: a43655da7c7dcfb9f663536aa9d052929f84f43a266f539fb8b8fdc66d8591e2
                                                      • Opcode Fuzzy Hash: c73522a68df74b23a811ebd18b02dbce82a97bc164b6864a54603efb8e306421
                                                      • Instruction Fuzzy Hash: 69011A76A00221AFE741DFB98CC49AB7BE8EF89581309442AEA85D2521DB38C9459F74
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsChild.USER32(?,?), ref: 1003A038
                                                      • GetParent.USER32(?), ref: 1003A0C9
                                                      • IsWindow.USER32(?), ref: 1003A1FB
                                                      • IsWindowVisible.USER32(?), ref: 1003A20D
                                                        • Part of subcall function 1007FF80: IsWindowEnabled.USER32(?), ref: 1007FF8A
                                                      • GetParent.USER32(?), ref: 1003A25E
                                                      • IsChild.USER32(?,?), ref: 1003A27E
                                                      • GetParent.USER32(?), ref: 1003A427
                                                      • SendMessageA.USER32(?,000000F1,00000001,00000000), ref: 1003A444
                                                      • IsWindow.USER32(?), ref: 1003A49F
                                                        • Part of subcall function 10030780: IsChild.USER32(?,?), ref: 100307FD
                                                        • Part of subcall function 10030780: GetParent.USER32(?), ref: 10030817
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ParentWindow$Child$EnabledMessageSendVisible
                                                      • String ID:
                                                      • API String ID: 2452671399-0
                                                      • Opcode ID: 93ed890599a60effc162fcbc3a63744cfd970c334dbd36cb114842b00037b745
                                                      • Instruction ID: 3f125f7c16190333ba8a94a6d468b168d8d5049406b348e89233bb6d5af9a5a0
                                                      • Opcode Fuzzy Hash: 93ed890599a60effc162fcbc3a63744cfd970c334dbd36cb114842b00037b745
                                                      • Instruction Fuzzy Hash: E3E1AC75A083419FC321CF64C881B5FB7E8FB86741F414A1CF9869B291DB74E985CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 28b1849e66dd8c9ef157f9499b62602541b0590171424f54b8df726f00b7c8df
                                                      • Instruction ID: 87f677223cbba6e949070e1acf205c117c094efb82bf677fcf60830de0c79e49
                                                      • Opcode Fuzzy Hash: 28b1849e66dd8c9ef157f9499b62602541b0590171424f54b8df726f00b7c8df
                                                      • Instruction Fuzzy Hash: 38819076700B019FE320CF68ECD5EABB3A8FB94755F50892EF142CB2A1D765E8458790
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 10042F40: CreateDIBitmap.GDI32(?,?,00000004,?,?,00000000), ref: 10042FC7
                                                        • Part of subcall function 10042F40: CreateCompatibleDC.GDI32(?), ref: 10042FDF
                                                        • Part of subcall function 10042F40: CreateCompatibleDC.GDI32(?), ref: 10042FE4
                                                        • Part of subcall function 10042F40: SelectObject.GDI32(00000000,?), ref: 10042FED
                                                        • Part of subcall function 10042F40: CreateCompatibleBitmap.GDI32(?,?,?), ref: 10043000
                                                        • Part of subcall function 10042F40: SelectObject.GDI32(00000000,00000000), ref: 10043012
                                                        • Part of subcall function 10042F40: BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 1004302F
                                                        • Part of subcall function 10042F40: SelectObject.GDI32(00000000,?), ref: 1004303B
                                                        • Part of subcall function 10042F40: DeleteDC.GDI32(00000000), ref: 10043044
                                                        • Part of subcall function 10042F40: SelectObject.GDI32(00000000,?), ref: 1004304C
                                                        • Part of subcall function 10042F40: DeleteDC.GDI32(00000000), ref: 1004304F
                                                      • __ftol.LIBCMT ref: 10026DB9
                                                      • __ftol.LIBCMT ref: 10026DC6
                                                      • CreateRectRgn.GDI32(00000000,?,00000000,?), ref: 10026E35
                                                      • CombineRgn.GDI32(?,?,100A8FB4,00000004), ref: 10026E5B
                                                      • SetRect.USER32(?,00000000,?,?,?), ref: 10026EA6
                                                      • IntersectRect.USER32(?,?,?), ref: 10026EBE
                                                      • IsRectEmpty.USER32(?), ref: 10026EE9
                                                      • CreateRectRgn.GDI32(00000000,?,?,00000000), ref: 10026F8B
                                                      • CombineRgn.GDI32(?,?,100A8FB4,00000004), ref: 10026FB1
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Create$Rect$ObjectSelect$Compatible$BitmapCombineDelete__ftol$EmptyIntersect
                                                      • String ID:
                                                      • API String ID: 909876544-0
                                                      • Opcode ID: 7b2c6e774252ca8c9bd14badb7f41a957c95987716057d7352a5985c5596c9e8
                                                      • Instruction ID: 4cfa8b093a80c43f5a99365f08a902818c396301f632aeccf8fcd276f102a7dd
                                                      • Opcode Fuzzy Hash: 7b2c6e774252ca8c9bd14badb7f41a957c95987716057d7352a5985c5596c9e8
                                                      • Instruction Fuzzy Hash: C0A18BB16087429FD714CF28DD84A5BBBE9FBC8340F514A2DF5A583290EB70E904CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CompareStringW.KERNEL32(00000000,00000000,100AA56C,00000001,100AA56C,00000001,00000000,04B711CC,0000000C,00000000,0000000C,00000000,000001D0,00000000,00000000,1006BDC2), ref: 1007780F
                                                      • CompareStringA.KERNEL32(00000000,00000000,100AA568,00000001,100AA568,00000001), ref: 1007782C
                                                      • CompareStringA.KERNEL32(10061746,00000000,00000000,00000000,1006BDC2,00000000,00000000,04B711CC,0000000C,00000000,0000000C,00000000,000001D0,00000000,00000000,1006BDC2), ref: 1007788A
                                                      • GetCPInfo.KERNEL32(00000000,00000000,00000000,04B711CC,0000000C,00000000,0000000C,00000000,000001D0,00000000,00000000,1006BDC2,00000000), ref: 100778DB
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000), ref: 1007795A
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,?,?), ref: 100779BB
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,?,00000000,00000000), ref: 100779CE
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 10077A1A
                                                      • CompareStringW.KERNEL32(10061746,00000000,00000000,00000000,?,00000000,?,00000000), ref: 10077A32
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ByteCharCompareMultiStringWide$Info
                                                      • String ID:
                                                      • API String ID: 1651298574-0
                                                      • Opcode ID: a0db1c00445878b4c69b7402f74a63a5ca5bf83f4637c84f7f92c42e4dc88d39
                                                      • Instruction ID: e1bb61192b041211f71e232528ab970eaebe1d630276bbc0d3745092d0db4806
                                                      • Opcode Fuzzy Hash: a0db1c00445878b4c69b7402f74a63a5ca5bf83f4637c84f7f92c42e4dc88d39
                                                      • Instruction Fuzzy Hash: 5371E23190029ABFDF12CF94CC859DE7FB6FB052D0F11816AF998A2160D7398D51CBA6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CopyRect.USER32(?,00000000), ref: 1004C327
                                                      • IsRectEmpty.USER32(?), ref: 1004C332
                                                      • GetClientRect.USER32(00000000,?), ref: 1004C371
                                                      • DPtoLP.GDI32(?,?,00000002), ref: 1004C383
                                                      • LPtoDP.GDI32(?,?,00000002), ref: 1004C3C0
                                                      • CreateRectRgnIndirect.GDI32(?), ref: 1004C3D8
                                                      • OffsetRect.USER32(?,?,?), ref: 1004C3FD
                                                      • LPtoDP.GDI32(?,?,00000002), ref: 1004C40F
                                                        • Part of subcall function 1008287D: __EH_prolog.LIBCMT ref: 10082882
                                                        • Part of subcall function 1008287D: CreatePen.GDI32(?,?,?), ref: 100828A5
                                                        • Part of subcall function 10081E64: SelectObject.GDI32(10023605,00000000), ref: 10081E86
                                                        • Part of subcall function 10081E64: SelectObject.GDI32(10023605,?), ref: 10081E9C
                                                        • Part of subcall function 10081E28: GetStockObject.GDI32(?), ref: 10081E31
                                                        • Part of subcall function 10081E28: SelectObject.GDI32(10023605,00000000), ref: 10081E4B
                                                        • Part of subcall function 10081E28: SelectObject.GDI32(10023605,00000000), ref: 10081E56
                                                        • Part of subcall function 10081F9C: SetROP2.GDI32(?,?), ref: 10081FB5
                                                        • Part of subcall function 10081F9C: SetROP2.GDI32(?,?), ref: 10081FC3
                                                      • Rectangle.GDI32(?,?,?,?,?), ref: 1004C483
                                                        • Part of subcall function 10082291: SelectClipRgn.GDI32(?,00000000), ref: 100822B3
                                                        • Part of subcall function 10082291: SelectClipRgn.GDI32(?,?), ref: 100822C9
                                                        • Part of subcall function 10082867: DeleteObject.GDI32(00000000), ref: 10082876
                                                        • Part of subcall function 100825DA: __EH_prolog.LIBCMT ref: 100825DF
                                                        • Part of subcall function 100825DA: ReleaseDC.USER32(00000000,00000000), ref: 100825FE
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ObjectSelect$Rect$ClipCreateH_prolog$ClientCopyDeleteEmptyIndirectOffsetRectangleReleaseStock
                                                      • String ID:
                                                      • API String ID: 2841338838-0
                                                      • Opcode ID: d4654c46fb886bc8b764fedb641776730efd96767a7f2b8e336fb88c4b250fa2
                                                      • Instruction ID: f581f7697e3af425642236643d312e48085974c0a33a38ce2f23f31bd5d43305
                                                      • Opcode Fuzzy Hash: d4654c46fb886bc8b764fedb641776730efd96767a7f2b8e336fb88c4b250fa2
                                                      • Instruction Fuzzy Hash: 19615675508740AFD314DF65C885EABBBE9FF88704F008A1EF59683291DB74E909CB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LCMapStringW.KERNEL32(00000000,00000100,100AA56C,00000001,00000000,00000000,76F8E860,100D1450,?,00000003,00000000,00000001,00000000,?,?,1006D341), ref: 10073516
                                                      • LCMapStringA.KERNEL32(00000000,00000100,100AA568,00000001,00000000,00000000,?,?,1006D341,?), ref: 10073532
                                                      • LCMapStringA.KERNEL32(?,?,00000000,00000001,00000000,00000003,76F8E860,100D1450,?,00000003,00000000,00000001,00000000,?,?,1006D341), ref: 1007357B
                                                      • MultiByteToWideChar.KERNEL32(?,100D1451,00000000,00000001,00000000,00000000,76F8E860,100D1450,?,00000003,00000000,00000001,00000000,?,?,1006D341), ref: 100735B3
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,?,00000000), ref: 1007360B
                                                      • LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000), ref: 10073621
                                                      • LCMapStringW.KERNEL32(?,?,?,00000000,?,?), ref: 10073654
                                                      • LCMapStringW.KERNEL32(?,?,?,?,?,00000000), ref: 100736BC
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: String$ByteCharMultiWide
                                                      • String ID:
                                                      • API String ID: 352835431-0
                                                      • Opcode ID: 1f4793ae08f8275a1ded42609d02999583971e5e90782bb43ed50a6a1f29e2f4
                                                      • Instruction ID: 8f43eb6ff217bb115d6f2817595df039439cf317b3c6ef83bed15a85c4571dbd
                                                      • Opcode Fuzzy Hash: 1f4793ae08f8275a1ded42609d02999583971e5e90782bb43ed50a6a1f29e2f4
                                                      • Instruction Fuzzy Hash: E7514871900659FBEF12CF98CC86EEE3BB5FB48790F10C119F994A1160C7369960DB69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetCapture.USER32 ref: 1003E476
                                                      • ClientToScreen.USER32(?,?), ref: 1003E4B3
                                                      • OffsetRect.USER32(?,?,?), ref: 1003E4DC
                                                      • GetParent.USER32(?), ref: 1003E4E2
                                                        • Part of subcall function 100823D6: ScreenToClient.USER32(?,?), ref: 100823EA
                                                        • Part of subcall function 100823D6: ScreenToClient.USER32(?,?), ref: 100823F3
                                                      • GetClientRect.USER32(?,?), ref: 1003E505
                                                      • OffsetRect.USER32(?,?,00000000), ref: 1003E523
                                                      • OffsetRect.USER32(?,?,00000000), ref: 1003E53B
                                                      • OffsetRect.USER32(?,00000000,?), ref: 1003E559
                                                      • OffsetRect.USER32(?,00000000,?), ref: 1003E579
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect$Offset$Client$Screen$CaptureParent
                                                      • String ID:
                                                      • API String ID: 838496554-0
                                                      • Opcode ID: 546bb2392f63bda951d82c2ca35ce6a6e74586aeffd064713028b8a77430ea6b
                                                      • Instruction ID: aea2ec4a7417b13d6ab25e3f8d8b4ef222eebb122ec69d5ff20dcfe929bf25c2
                                                      • Opcode Fuzzy Hash: 546bb2392f63bda951d82c2ca35ce6a6e74586aeffd064713028b8a77430ea6b
                                                      • Instruction Fuzzy Hash: D841D7B5604742AFD708DF68C994D6FB7E9FBC8704F008A1EF586C7251DA74ED088A62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1007CC68
                                                      • FindResourceA.KERNEL32(?,00000000,00000005), ref: 1007CCA0
                                                      • LoadResource.KERNEL32(?,00000000,?,?,?,00000000), ref: 1007CCA8
                                                        • Part of subcall function 1007DAA3: UnhookWindowsHookEx.USER32(?), ref: 1007DAC8
                                                      • LockResource.KERNEL32(?,?,00000000,?,?,?,00000000), ref: 1007CCB5
                                                      • IsWindowEnabled.USER32(?), ref: 1007CCE8
                                                      • EnableWindow.USER32(?,00000000), ref: 1007CCF6
                                                      • EnableWindow.USER32(?,00000001), ref: 1007CD84
                                                      • GetActiveWindow.USER32 ref: 1007CD8F
                                                      • SetActiveWindow.USER32(?,?,?,00000000,?,?,?,00000000), ref: 1007CD9D
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Window$Resource$ActiveEnable$EnabledFindH_prologHookLoadLockUnhookWindows
                                                      • String ID:
                                                      • API String ID: 401145483-0
                                                      • Opcode ID: 980bef1c6a097a6430b8083afb43b028b3eaeb754123b4925a38128e847ed37d
                                                      • Instruction ID: 9a76af148e0e1a646de0edf37470e176aa39f7547b77bf46c70c92c1bc5d52c4
                                                      • Opcode Fuzzy Hash: 980bef1c6a097a6430b8083afb43b028b3eaeb754123b4925a38128e847ed37d
                                                      • Instruction Fuzzy Hash: D841B234900A19DFDB22DF64CC4AA6EBBF5FF44711F10851EF582A2291CB799D40CB69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • InvalidateRect.USER32(?,?,00000001,?,?,?,?), ref: 1003BDBA
                                                      • GetTopWindow.USER32(?), ref: 1003BDC0
                                                      • IsWindowVisible.USER32(00000000), ref: 1003BDD1
                                                      • GetWindowLongA.USER32(00000000,000000EC), ref: 1003BDE2
                                                      • GetClientRect.USER32(00000000,?), ref: 1003BE35
                                                      • IntersectRect.USER32(?,?,?), ref: 1003BE4A
                                                      • IsRectEmpty.USER32(?), ref: 1003BE55
                                                      • InvalidateRect.USER32(00000000,00000000,00000000,?,?,?,?), ref: 1003BE66
                                                      • GetWindow.USER32(00000000,00000002), ref: 1003BE6B
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect$Window$Invalidate$ClientEmptyIntersectLongVisible
                                                      • String ID:
                                                      • API String ID: 938479747-0
                                                      • Opcode ID: da162a3d09eaa61a1892a10acab046d515c3aba86011ec6986283d64d367a9c6
                                                      • Instruction ID: 69e10d6910b069e3513fa7112125db094e5bf6f74086f00aa20e8ffdd95a85fe
                                                      • Opcode Fuzzy Hash: da162a3d09eaa61a1892a10acab046d515c3aba86011ec6986283d64d367a9c6
                                                      • Instruction Fuzzy Hash: 6D218071504B16AFD302DF65C8D4DABB7ECFF88645F004A1EF64196211DB34EA49CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • lstrlenA.KERNEL32(?,?,?,0000000C,?,?,10040299,?,-00000001,00000000,?,?,?,100BCBD8), ref: 10079D61
                                                      • GetFocus.USER32 ref: 10079D7C
                                                        • Part of subcall function 1007DAA3: UnhookWindowsHookEx.USER32(?), ref: 1007DAC8
                                                      • IsWindowEnabled.USER32(?), ref: 10079DA5
                                                      • EnableWindow.USER32(?,00000000), ref: 10079DB7
                                                      • GetOpenFileNameA.COMDLG32(?,?), ref: 10079DE2
                                                      • GetSaveFileNameA.COMDLG32(?,?), ref: 10079DE9
                                                      • EnableWindow.USER32(?,00000001), ref: 10079E00
                                                      • IsWindow.USER32(?), ref: 10079E06
                                                      • SetFocus.USER32(?), ref: 10079E14
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Window$EnableFileFocusName$EnabledHookOpenSaveUnhookWindowslstrlen
                                                      • String ID:
                                                      • API String ID: 3606897497-0
                                                      • Opcode ID: 9e492c98074718bbdea668cec9581158a42bb9717212cf541594ce700e8a5ad5
                                                      • Instruction ID: ad700750e4f651b2862cfca28ae5a483cdb0f0ad4abb03890e952066085f3fd3
                                                      • Opcode Fuzzy Hash: 9e492c98074718bbdea668cec9581158a42bb9717212cf541594ce700e8a5ad5
                                                      • Instruction Fuzzy Hash: 43218E75600704ABEB21EB71DC46B5B77E9FF40350F01841EF5D286291DB79E804C755
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 89bc473831b0c1eee0ebfcca9b027e4b29fe5e32e2cde0f2b6782ba06102b02d
                                                      • Instruction ID: 9afb1ba709baa70a703e5fb74259b138f162aed6de51a48b30b9487251100c0f
                                                      • Opcode Fuzzy Hash: 89bc473831b0c1eee0ebfcca9b027e4b29fe5e32e2cde0f2b6782ba06102b02d
                                                      • Instruction Fuzzy Hash: 9EC1F135B056128BD718DE28FCD4A6A73D5EB853D1FA0487AF905CB386EA36EC81C750
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreatePopupMenu.USER32 ref: 1004099E
                                                      • AppendMenuA.USER32(?,?,00000000,?), ref: 10040B01
                                                      • AppendMenuA.USER32(?,00000000,00000000,?), ref: 10040B39
                                                      • ModifyMenuA.USER32(?,00000000,00000000,00000000,00000000), ref: 10040B57
                                                      • AppendMenuA.USER32(?,?,00000000,?), ref: 10040BB5
                                                      • ModifyMenuA.USER32(?,?,?,?,?), ref: 10040BDA
                                                      • AppendMenuA.USER32(?,?,?,?), ref: 10040C22
                                                      • ModifyMenuA.USER32(?,?,?,?,?), ref: 10040C47
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Menu$Append$Modify$CreatePopup
                                                      • String ID:
                                                      • API String ID: 3846898120-0
                                                      • Opcode ID: 7cb4d71c90146dcbef5aca74c79e68ca82646ddbdce6bd2a5ceeb7b589839a0d
                                                      • Instruction ID: 9777774b451ce3506b320e04c55651c87e9e96542f430d28038a017c1b40d6da
                                                      • Opcode Fuzzy Hash: 7cb4d71c90146dcbef5aca74c79e68ca82646ddbdce6bd2a5ceeb7b589839a0d
                                                      • Instruction Fuzzy Hash: A5D17B75A083519BD314CF58C880A2BB7E8FF89754F24492CF989A7352E734ED05CBA6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 1006FFA0
                                                      • GetStdHandle.KERNEL32(000000F4,100AA2F8,00000000,?,00000000,?), ref: 10070076
                                                      • WriteFile.KERNEL32(00000000), ref: 1007007D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: File$HandleModuleNameWrite
                                                      • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                      • API String ID: 3784150691-4022980321
                                                      • Opcode ID: f3aca7ed98bf5d7e8ba5e9e61955a1ade06d5876970053054ebc81ab00ca00cd
                                                      • Instruction ID: 80d310f1b47567c7438fafaf44976e4417a805102d592303902aae8fecb70038
                                                      • Opcode Fuzzy Hash: f3aca7ed98bf5d7e8ba5e9e61955a1ade06d5876970053054ebc81ab00ca00cd
                                                      • Instruction Fuzzy Hash: 5C31D476A00218AFDF21EBA0CC41FEE77ADEF46350F504567F681E6090E774AA848B51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: accept
                                                      • String ID: %s:%d$P
                                                      • API String ID: 3005279540-612342447
                                                      • Opcode ID: 21bf101f440a51676ad5b199ae4f31c776f54648993bc1f073bc6185f65f6c8e
                                                      • Instruction ID: 2da3794e409095841302a806a7351b9d89a70ee780a9f7fc7b5a1d66da46c831
                                                      • Opcode Fuzzy Hash: 21bf101f440a51676ad5b199ae4f31c776f54648993bc1f073bc6185f65f6c8e
                                                      • Instruction Fuzzy Hash: DB31C431504A019FE310EB28DC84DABB3E8FFD4324F104B2DF5A1C21E0EB74A81A8B55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: __ftol
                                                      • String ID:
                                                      • API String ID: 495808979-0
                                                      • Opcode ID: 0ed9f3094a5207052493a2436751f2675f648756f01d0b84b0aea85ff7010d27
                                                      • Instruction ID: 8035275101429845c4e8a87d8093829a86c21c0d437f46997616fe660a55c968
                                                      • Opcode Fuzzy Hash: 0ed9f3094a5207052493a2436751f2675f648756f01d0b84b0aea85ff7010d27
                                                      • Instruction Fuzzy Hash: D1D154B2908346CFD3019F21D48965ABFF0FFD0744FA64999E0D56626AE3308578CF82
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 100826D0: __EH_prolog.LIBCMT ref: 100826D5
                                                        • Part of subcall function 100826D0: BeginPaint.USER32(?,?,?,?,10026739), ref: 100826FE
                                                        • Part of subcall function 10082281: GetClipBox.GDI32(?,?), ref: 10082288
                                                      • IsRectEmpty.USER32(?), ref: 1003D5DD
                                                      • GetSysColor.USER32(0000000F), ref: 1003D5EE
                                                        • Part of subcall function 100828CD: __EH_prolog.LIBCMT ref: 100828D2
                                                        • Part of subcall function 100828CD: CreateSolidBrush.GDI32(?), ref: 100828EF
                                                        • Part of subcall function 10081E64: SelectObject.GDI32(10023605,00000000), ref: 10081E86
                                                        • Part of subcall function 10081E64: SelectObject.GDI32(10023605,?), ref: 10081E9C
                                                      • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 1003D638
                                                      • GetClientRect.USER32(?,?), ref: 1003D651
                                                      • LoadBitmapA.USER32(?,?), ref: 1003D688
                                                      • GetObjectA.GDI32(?,00000018,?), ref: 1003D6D7
                                                      • CreateCompatibleDC.GDI32(?), ref: 1003D6FD
                                                      • BitBlt.GDI32(?,?,?,?,?,?,00000000,00000000,00CC0020), ref: 1003D78F
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Object$CreateH_prologRectSelect$BeginBitmapBrushClientClipColorCompatibleEmptyLoadPaintSolid
                                                      • String ID:
                                                      • API String ID: 1390316934-0
                                                      • Opcode ID: 3a0e04cf3a78fc41881a09dea39902704f3c10a93eb22cae899e4e06f3a78ada
                                                      • Instruction ID: c921b5b434d9ef871c1331a6c70d5eacac841b74d51ef1b2f75ecf74d9d3fbf7
                                                      • Opcode Fuzzy Hash: 3a0e04cf3a78fc41881a09dea39902704f3c10a93eb22cae899e4e06f3a78ada
                                                      • Instruction Fuzzy Hash: 3B613A76518781AFD314DB64CC45FABBBE8FBD4710F048A1EF59987281DB34A904CB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetDeviceCaps.GDI32(?,00000058), ref: 1005B738
                                                      • GetDeviceCaps.GDI32(?,0000005A), ref: 1005B741
                                                      • GetDeviceCaps.GDI32(?,0000006E), ref: 1005B752
                                                      • GetDeviceCaps.GDI32(?,0000006F), ref: 1005B76F
                                                      • GetDeviceCaps.GDI32(?,00000070), ref: 1005B784
                                                      • GetDeviceCaps.GDI32(?,00000071), ref: 1005B799
                                                      • GetDeviceCaps.GDI32(?,00000008), ref: 1005B7AE
                                                      • GetDeviceCaps.GDI32(?,0000000A), ref: 1005B7C3
                                                        • Part of subcall function 1005B500: __ftol.LIBCMT ref: 1005B505
                                                        • Part of subcall function 1005B530: __ftol.LIBCMT ref: 1005B535
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CapsDevice$__ftol
                                                      • String ID:
                                                      • API String ID: 1555043975-0
                                                      • Opcode ID: fce7129296ed158d4615886c6ded8dc70ca2e59240f8a1bc171b43e6d3dfe5b5
                                                      • Instruction ID: ec535d74d0691e387f91727cf14989c488bc718eb62c4a25b2a170ad660a5914
                                                      • Opcode Fuzzy Hash: fce7129296ed158d4615886c6ded8dc70ca2e59240f8a1bc171b43e6d3dfe5b5
                                                      • Instruction Fuzzy Hash: F7514771508B08ABD700EF69C885A6FBBE4FFC9700F054958F6C4562A0EB71E9248B92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,1006B694), ref: 1006FB69
                                                      • GetEnvironmentStrings.KERNEL32(?,?,?,?,1006B694), ref: 1006FB7D
                                                      • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,1006B694), ref: 1006FBA9
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,?,1006B694), ref: 1006FBE1
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,?,1006B694), ref: 1006FC03
                                                      • FreeEnvironmentStringsW.KERNEL32(00000000,?,?,?,?,1006B694), ref: 1006FC1C
                                                      • GetEnvironmentStrings.KERNEL32(?,?,?,?,?,?,1006B694), ref: 1006FC2F
                                                      • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 1006FC6D
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                      • String ID:
                                                      • API String ID: 1823725401-0
                                                      • Opcode ID: 58d1a7f0d62dcd834447392aa72ff47674e15d46382179c23e600ff25990db17
                                                      • Instruction ID: f808bbde6161e9a4259b0536dde0854b67313e570b56ee6b5654c633013fe23d
                                                      • Opcode Fuzzy Hash: 58d1a7f0d62dcd834447392aa72ff47674e15d46382179c23e600ff25990db17
                                                      • Instruction Fuzzy Hash: D93108B29042AE2FE711FB789DD483F7ADFEB496A4792052EFD51C3101DB224C4097A5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ReleaseCapture.USER32 ref: 100549D1
                                                        • Part of subcall function 1007FF80: IsWindowEnabled.USER32(?), ref: 1007FF8A
                                                      • GetClientRect.USER32(?,?), ref: 10054927
                                                      • PtInRect.USER32(?,?,?), ref: 1005493C
                                                      • ClientToScreen.USER32(?,?), ref: 1005494D
                                                      • WindowFromPoint.USER32(?,?), ref: 1005495D
                                                      • ReleaseCapture.USER32 ref: 10054977
                                                      • GetCapture.USER32 ref: 10054991
                                                      • SetCapture.USER32(?), ref: 1005499C
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Capture$ClientRectReleaseWindow$EnabledFromPointScreen
                                                      • String ID:
                                                      • API String ID: 3076215760-0
                                                      • Opcode ID: fa2ac394ce438d4314d0634e2e22da8665215cc784c694c085b9a3199e24ac1e
                                                      • Instruction ID: 670ca177a482b027533b235d13d4e1db7377d5fa656e1f475539336fd2cd9ff9
                                                      • Opcode Fuzzy Hash: fa2ac394ce438d4314d0634e2e22da8665215cc784c694c085b9a3199e24ac1e
                                                      • Instruction Fuzzy Hash: 9021B6366006105BE301DB14C886AAF77E4FFC4359F05491EF98282251EB70E9098B61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GlobalLock.KERNEL32(?), ref: 100803AC
                                                      • lstrcmpA.KERNEL32(?,?), ref: 100803B8
                                                      • OpenPrinterA.WINSPOOL.DRV(?,?,00000000), ref: 100803CA
                                                      • DocumentPropertiesA.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 100803ED
                                                      • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 100803F5
                                                      • GlobalLock.KERNEL32(00000000), ref: 10080402
                                                      • DocumentPropertiesA.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000002), ref: 1008040F
                                                      • ClosePrinter.WINSPOOL.DRV(?,00000000,?,?,00000000,00000000,00000002), ref: 1008042D
                                                        • Part of subcall function 1008322F: GlobalFlags.KERNEL32(?), ref: 10083239
                                                        • Part of subcall function 1008322F: GlobalUnlock.KERNEL32(?,?,?,?,10031560,?,?,?,?,?,?,?,?,1003BEDD), ref: 10083250
                                                        • Part of subcall function 1008322F: GlobalFree.KERNEL32(?), ref: 1008325B
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Global$DocumentLockProperties$AllocCloseFlagsFreeOpenPrinterPrinter.Unlocklstrcmp
                                                      • String ID:
                                                      • API String ID: 168474834-0
                                                      • Opcode ID: da61b80d09e8c694971aa2ea5358a5f585acc4448b458f96af782e1b5f9d2815
                                                      • Instruction ID: 83dacf43b476496686fd483c9584c89cfb53daf4410bf0abefdfdda387d139f2
                                                      • Opcode Fuzzy Hash: da61b80d09e8c694971aa2ea5358a5f585acc4448b458f96af782e1b5f9d2815
                                                      • Instruction Fuzzy Hash: 5A118C75900204BAEB11DBA6CC8AEAF7ABEFF85740F40441AF609C5122D631EE419B20
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetClientRect.USER32(?,?), ref: 1002AB0C
                                                      • PtInRect.USER32(?,?,?), ref: 1002AB21
                                                      • ReleaseCapture.USER32 ref: 1002AB31
                                                      • InvalidateRect.USER32(?,00000000,00000000), ref: 1002AB3F
                                                      • GetCapture.USER32 ref: 1002AB4F
                                                      • SetCapture.USER32(?), ref: 1002AB5A
                                                      • InvalidateRect.USER32(?,00000000,00000000), ref: 1002AB7B
                                                      • SetCapture.USER32(?), ref: 1002AB85
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CaptureRect$Invalidate$ClientRelease
                                                      • String ID:
                                                      • API String ID: 3559558096-0
                                                      • Opcode ID: 259ebc701e63ca57c93065d0276cabf17c275b1d6f85e8e14cb345c38401c8a0
                                                      • Instruction ID: afab60260cf3428f2fa4d871a8a9e89afb31767194cd8a3e25e40b7ac3f1ee2a
                                                      • Opcode Fuzzy Hash: 259ebc701e63ca57c93065d0276cabf17c275b1d6f85e8e14cb345c38401c8a0
                                                      • Instruction Fuzzy Hash: EA111876900B21AFE321EB64CC99F9B77A8FB48711F408A0AF58696251EB34E9448B54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsWindow.USER32(?), ref: 100301AD
                                                      • GetParent.USER32(?), ref: 100301BF
                                                      • SendMessageA.USER32(?,0000130B,00000000,00000000), ref: 100301E7
                                                      • GetWindowRect.USER32(?,?), ref: 10030271
                                                      • InvalidateRect.USER32(?,?,00000001,?), ref: 10030294
                                                      • GetWindowRect.USER32(?,?), ref: 1003045C
                                                      • InvalidateRect.USER32(?,?,00000001,?), ref: 1003047D
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect$Window$Invalidate$MessageParentSend
                                                      • String ID:
                                                      • API String ID: 236041146-0
                                                      • Opcode ID: 2f89fad49975cb88d6d6b2fe744a376db97965289f69b7e114b1de629e58e4ad
                                                      • Instruction ID: bc87499dedd33595bb4d407618ab0b589ff526b388f76ec11dfadd39f54288a1
                                                      • Opcode Fuzzy Hash: 2f89fad49975cb88d6d6b2fe744a376db97965289f69b7e114b1de629e58e4ad
                                                      • Instruction Fuzzy Hash: 5A91DF75A04301AFD322DF60D8A0B2F73E8EF84695F01461CFD459B292EB34EE068B91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetClientRect.USER32(?,?), ref: 1005CBBD
                                                      • GetParent.USER32(?), ref: 1005CBC9
                                                      • GetClientRect.USER32(?,?), ref: 1005CBDA
                                                        • Part of subcall function 10082412: ClientToScreen.USER32(10024D28,?), ref: 10082426
                                                        • Part of subcall function 10082412: ClientToScreen.USER32(10024D28,?), ref: 1008242F
                                                      • GetParent.USER32(?), ref: 1005CBEC
                                                        • Part of subcall function 100823D6: ScreenToClient.USER32(?,?), ref: 100823EA
                                                        • Part of subcall function 100823D6: ScreenToClient.USER32(?,?), ref: 100823F3
                                                        • Part of subcall function 10082568: __EH_prolog.LIBCMT ref: 1008256D
                                                        • Part of subcall function 10082568: GetDC.USER32(?), ref: 10082596
                                                      • SendMessageA.USER32 ref: 1005CC1F
                                                        • Part of subcall function 10081E64: SelectObject.GDI32(10023605,00000000), ref: 10081E86
                                                        • Part of subcall function 10081E64: SelectObject.GDI32(10023605,?), ref: 10081E9C
                                                      • GetTextExtentPoint32A.GDI32(?,100B42AC,00000001,?), ref: 1005CC4C
                                                      • EqualRect.USER32(?,?), ref: 1005CE0A
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Client$Screen$Rect$ObjectParentSelect$EqualExtentH_prologMessagePoint32SendText
                                                      • String ID:
                                                      • API String ID: 98060165-0
                                                      • Opcode ID: b14ad9cbe06a7de740fe19f690fd4f75dffbff5a7e319dcaf168e67883396b02
                                                      • Instruction ID: cc2be6a71fb319b79ae3d0c7568bee07e4b9e88126ee0b5b89539ba5f263217f
                                                      • Opcode Fuzzy Hash: b14ad9cbe06a7de740fe19f690fd4f75dffbff5a7e319dcaf168e67883396b02
                                                      • Instruction Fuzzy Hash: F0917F756087499FC718CF28C881A6BBBF5FBC8640F104A2EF596C7251EB74E909CB52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetRect.USER32(?,00000000,00000032,00000032,?), ref: 10042459
                                                      • OffsetRect.USER32(?,?,?), ref: 10042466
                                                      • IntersectRect.USER32(?,?,?), ref: 10042482
                                                      • IsRectEmpty.USER32(?), ref: 1004248D
                                                      • OffsetRect.USER32(?,?,?), ref: 100424CA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect$Offset$EmptyIntersect
                                                      • String ID: 2
                                                      • API String ID: 765610062-450215437
                                                      • Opcode ID: 5e1086a9967e3e1f2946c1b521b6d9c192f80b2abecdbcf199709d2f6db1214a
                                                      • Instruction ID: 12507d259d05c18b0eaf94267601e1ba81312664be851fb918941e6bf4b1bc25
                                                      • Opcode Fuzzy Hash: 5e1086a9967e3e1f2946c1b521b6d9c192f80b2abecdbcf199709d2f6db1214a
                                                      • Instruction Fuzzy Hash: E16113B56087419FD314DF29C894A5BBBE5FBC8340F608A2EF989C7221D730E905CB52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageA.USER32(?,0000019F,00000000,00000000), ref: 100842DE
                                                      • GetParent.USER32(?), ref: 100842E5
                                                        • Part of subcall function 1007FDF1: GetWindowLongA.USER32(?,000000F0), ref: 1007FDFD
                                                      • SendMessageA.USER32(?,00000187,00000000,00000000), ref: 10084338
                                                      • SendMessageA.USER32(0000AC84,00000111,?,?), ref: 10084389
                                                      • SendMessageA.USER32(?,00000185,00000000,00000000), ref: 10084414
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$LongParentWindow
                                                      • String ID:
                                                      • API String ID: 779260966-3916222277
                                                      • Opcode ID: ec23e11066e6c4b3445ef7ab6e0ecc57873f05117990885a06c4d15a515bce85
                                                      • Instruction ID: 45e44ec368b5696bbde77be731f2a23e701f1cedf83e724abb6f611bec172fb8
                                                      • Opcode Fuzzy Hash: ec23e11066e6c4b3445ef7ab6e0ecc57873f05117990885a06c4d15a515bce85
                                                      • Instruction Fuzzy Hash: ED31C570A107146FCA65FA758C81E2FB6DDFB85684B13893EF582D21D2CE65ED028670
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 1005AE2B
                                                        • Part of subcall function 1007FF9B: EnableWindow.USER32(?,00000000), ref: 1007FFA9
                                                        • Part of subcall function 1007FD17: GetDlgItem.USER32(?,?), ref: 1007FD25
                                                      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 1005AE65
                                                      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 1005AE7C
                                                      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 1005AECD
                                                      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 1005AF07
                                                      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 1005AF34
                                                      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 1005AF6A
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$EnableItemWindow
                                                      • String ID:
                                                      • API String ID: 607626308-0
                                                      • Opcode ID: 7e74ba45014605f1b29b620745ecc84f5b1c21324af36bd592b2c595832f5ff8
                                                      • Instruction ID: d0a88be88d84ac66398bc7a98263cda10289296c0686c10f3cb4bfe5d51358c9
                                                      • Opcode Fuzzy Hash: 7e74ba45014605f1b29b620745ecc84f5b1c21324af36bd592b2c595832f5ff8
                                                      • Instruction Fuzzy Hash: BB316D753807412AD634E2748CA2FBF6295DBC2B00F10482CF396AF1C2DDA8BD45875C
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetParent.USER32(?), ref: 1007F7CA
                                                      • PeekMessageA.USER32(00000000,00000000,00000000,00000000,00000000), ref: 1007F7F3
                                                      • UpdateWindow.USER32(?), ref: 1007F80F
                                                      • SendMessageA.USER32(?,00000121,00000000,?), ref: 1007F835
                                                      • SendMessageA.USER32(?,0000036A,00000000,00000001), ref: 1007F854
                                                      • UpdateWindow.USER32(?), ref: 1007F897
                                                      • PeekMessageA.USER32(00000000,00000000,00000000,00000000,00000000), ref: 1007F8CA
                                                        • Part of subcall function 1007FDF1: GetWindowLongA.USER32(?,000000F0), ref: 1007FDFD
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Message$Window$PeekSendUpdate$LongParent
                                                      • String ID:
                                                      • API String ID: 2853195852-0
                                                      • Opcode ID: 79a03e631b2b2a5ccb490c5217f2ff259e2c580a96d1339b7202022075230916
                                                      • Instruction ID: e22a3b1eeb5e7acad6bce3118b3af5863966c68be97f59c14689bf9275a8a8ca
                                                      • Opcode Fuzzy Hash: 79a03e631b2b2a5ccb490c5217f2ff259e2c580a96d1339b7202022075230916
                                                      • Instruction Fuzzy Hash: 95419230A047429FD361DF268848A2FBBE4FFC0B90F10891EF4C196152CB79D945CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 1008579D: __EH_prolog.LIBCMT ref: 100857A2
                                                        • Part of subcall function 1007FDF1: GetWindowLongA.USER32(?,000000F0), ref: 1007FDFD
                                                      • SendMessageA.USER32(?,000001A1,00000000,00000000), ref: 10084054
                                                      • SendMessageA.USER32(?,0000018B,00000000,00000000), ref: 10084063
                                                      • SendMessageA.USER32(?,0000018E,00000000,00000000), ref: 1008407C
                                                      • SendMessageA.USER32(?,0000018E,00000000,00000000), ref: 100840A4
                                                      • SendMessageA.USER32(?,0000018B,00000000,00000000), ref: 100840B3
                                                      • SendMessageA.USER32(?,00000198,?,?), ref: 100840C9
                                                      • PtInRect.USER32(?,000000FF,?), ref: 100840D5
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$H_prologLongRectWindow
                                                      • String ID:
                                                      • API String ID: 2846605207-0
                                                      • Opcode ID: f7650028cb3740549bce5d9efe224acd0df2138a79472f5fa2a0f30b0447cce3
                                                      • Instruction ID: 7a467a452ee1c36e3bd2ba38cce57ee6e8ec15ee8d51804f18f4ff7f8c88f896
                                                      • Opcode Fuzzy Hash: f7650028cb3740549bce5d9efe224acd0df2138a79472f5fa2a0f30b0447cce3
                                                      • Instruction Fuzzy Hash: 22311670A00609FFDB10DF94CC80D9EBBB9FB44354B21846AE511A72A1DA31AE519F10
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RegOpenKeyExA.ADVAPI32(80000001,software,00000000,0002001F,?,?,00000000), ref: 100864D9
                                                      • RegCreateKeyExA.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?,?,00000000), ref: 100864FC
                                                      • RegCreateKeyExA.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?,?,00000000), ref: 1008651B
                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 1008652B
                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 10086535
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CloseCreate$Open
                                                      • String ID: software
                                                      • API String ID: 1740278721-2010147023
                                                      • Opcode ID: ee0f4c261e0ac5cb4e562c2730242d7bb4814a69a667b297f1df7e0ad28149a4
                                                      • Instruction ID: 26b6359c4ee9ec565641be9196f09986f1f6c551c3a2b89b4695008c7afbde7b
                                                      • Opcode Fuzzy Hash: ee0f4c261e0ac5cb4e562c2730242d7bb4814a69a667b297f1df7e0ad28149a4
                                                      • Instruction Fuzzy Hash: 4711D272D00559FADB11DB9ACD84DEFBFBCEF89740F1100AAE614A2125D6709A00DB60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 1006B2E6
                                                      • GetSystemMetrics.USER32(00000000), ref: 1006B2FE
                                                      • GetSystemMetrics.USER32(00000001), ref: 1006B305
                                                      • lstrcpyA.KERNEL32(?,DISPLAY), ref: 1006B329
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: System$Metrics$InfoParameterslstrcpy
                                                      • String ID: B$DISPLAY
                                                      • API String ID: 1409579217-3316187204
                                                      • Opcode ID: 14eaf9dbadab75101f08b39b254ea7a47926eb2ac37be3a5b5b4b46c88046b68
                                                      • Instruction ID: e406b8580b5ac36f97dabc00ea5e6144d2f65fc3895676198a4d64225555ce29
                                                      • Opcode Fuzzy Hash: 14eaf9dbadab75101f08b39b254ea7a47926eb2ac37be3a5b5b4b46c88046b68
                                                      • Instruction Fuzzy Hash: C111C6B1A00634EBDB11DF64CC8468B7FE9FF09750B018052FD489E116D7B1DA80CBA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetSysColor.USER32(0000000F), ref: 10081B89
                                                      • GetSysColor.USER32(00000010), ref: 10081B90
                                                      • GetSysColor.USER32(00000014), ref: 10081B97
                                                      • GetSysColor.USER32(00000012), ref: 10081B9E
                                                      • GetSysColor.USER32(00000006), ref: 10081BA5
                                                      • GetSysColorBrush.USER32(0000000F), ref: 10081BB2
                                                      • GetSysColorBrush.USER32(00000006), ref: 10081BB9
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Color$Brush
                                                      • String ID:
                                                      • API String ID: 2798902688-0
                                                      • Opcode ID: 24653573e4ce93f72ad6aa6c06bf020e47082014d8151b80db9168b82cfbb6c1
                                                      • Instruction ID: 140f8acef627db91e8c2d44f53ab6ee7128d1b2e90ad6059688c50d7eabef174
                                                      • Opcode Fuzzy Hash: 24653573e4ce93f72ad6aa6c06bf020e47082014d8151b80db9168b82cfbb6c1
                                                      • Instruction Fuzzy Hash: C9F01C71D40B589BE730BF728D49B47BAE0FFC4B10F02092EE2858BA90E6B5A400DF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Window$ChildFocusVisible
                                                      • String ID:
                                                      • API String ID: 372613587-0
                                                      • Opcode ID: 5778a258c6f24bf2a3aa9a2ec7b199c1522503615f7b11e06b5b20f375c77fa7
                                                      • Instruction ID: dc9966ef87f07687da83bdd121c1ebc965f9574edcbd090628b9508519ef0125
                                                      • Opcode Fuzzy Hash: 5778a258c6f24bf2a3aa9a2ec7b199c1522503615f7b11e06b5b20f375c77fa7
                                                      • Instruction Fuzzy Hash: 4A51AE75A087419FC312DF65D8C0A6BB3E9FF85384F424A2DF8858B242DB34E845CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 1005A3AC
                                                        • Part of subcall function 1007B924: InterlockedIncrement.KERNEL32(-000000F4), ref: 1007B939
                                                      • OpenPrinterA.WINSPOOL.DRV(?,?,00000000), ref: 1005A3DD
                                                      • DocumentPropertiesA.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000), ref: 1005A425
                                                      • DocumentPropertiesA.WINSPOOL.DRV(?,?,?,00000000,00000000,0000000E,00000000,?,00000000,00000000,00000000,00000002,00000000), ref: 1005A4B2
                                                      • ClosePrinter.WINSPOOL.DRV(?,?,?,?,00000000,00000000,0000000E,00000000,?,00000000,00000000,00000000,00000002,00000000), ref: 1005A4E7
                                                        • Part of subcall function 1007BBAF: InterlockedDecrement.KERNEL32(-000000F4), ref: 1007BBC3
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: DocumentInterlockedProperties$CloseDecrementIncrementMessageOpenPrinterPrinter.Send
                                                      • String ID:
                                                      • API String ID: 1978028495-0
                                                      • Opcode ID: 67a0e1f7dbbbbbddd0797ee60883f508ec83a5fb81241831fc181d8f9b05ea23
                                                      • Instruction ID: e8844dc343a07b6e00fce8b327ec66d6c5c4710e985beac0fcaf5c03510e9011
                                                      • Opcode Fuzzy Hash: 67a0e1f7dbbbbbddd0797ee60883f508ec83a5fb81241831fc181d8f9b05ea23
                                                      • Instruction Fuzzy Hash: 2F41D378104345ABC724DF64CC81EEB77A9EFD9760F504A0CF85987281D774E945CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020006,?,?,?), ref: 1002186B
                                                      • RegCreateKeyA.ADVAPI32(?,?,?), ref: 10021884
                                                      • RegSetValueExA.ADVAPI32(?,?,00000000,00000004,?,00000004,000007D1,?,00000000), ref: 100218D6
                                                      • RegSetValueExA.ADVAPI32(?,?,00000000,00000001,?), ref: 10021905
                                                      • RegSetValueExA.ADVAPI32(?,?,00000000,00000003,?,?), ref: 10021930
                                                      • RegCloseKey.ADVAPI32(?), ref: 10021945
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Value$CloseCreateOpen
                                                      • String ID:
                                                      • API String ID: 2093102208-0
                                                      • Opcode ID: 9c568d020be47bf70714ba3d9619dae6e5d23f2b9f7f89959e8ff9c751dc1fec
                                                      • Instruction ID: 7b1b891d4e241374e8b18504960e43a444e160c098e63fbdd45495352dc623f3
                                                      • Opcode Fuzzy Hash: 9c568d020be47bf70714ba3d9619dae6e5d23f2b9f7f89959e8ff9c751dc1fec
                                                      • Instruction Fuzzy Hash: AD415A75608651AFE310DF25DC80FABB7E8FB88754F508A0DF999D7280D770E9058BA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CopyRect.USER32(?,00000000), ref: 1004C5B2
                                                      • IsRectEmpty.USER32(?), ref: 1004C5E3
                                                      • OffsetRect.USER32(?,00000000,?), ref: 1004C633
                                                      • LPtoDP.GDI32(?,?,00000002), ref: 1004C668
                                                      • GetClientRect.USER32(?,?), ref: 1004C677
                                                      • IntersectRect.USER32(?,?,?), ref: 1004C68C
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect$ClientCopyEmptyIntersectOffset
                                                      • String ID:
                                                      • API String ID: 1743551499-0
                                                      • Opcode ID: d5553f1ba2aafcc96d7d72058e2f5e5a994ca749e8ffb8781da3376e5f70d60d
                                                      • Instruction ID: b2a3cf4a425359e9ac4a3e05619e7ed9b19bf098cc24dc0b11ec58b914ddf7be
                                                      • Opcode Fuzzy Hash: d5553f1ba2aafcc96d7d72058e2f5e5a994ca749e8ffb8781da3376e5f70d60d
                                                      • Instruction Fuzzy Hash: 2B4129B66047019FD318CF68C890A6BB7E9FBC8700F048A2EF556C7251DB34E949CB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetStringTypeW.KERNEL32(00000001,100AA56C,00000001,?,76F8E860,100D1450,?,?,00000002,00000000,?,?,1006D341,?), ref: 10076665
                                                      • GetStringTypeA.KERNEL32(00000000,00000001,100AA568,00000001,?,?,?,1006D341,?), ref: 1007667F
                                                      • GetStringTypeA.KERNEL32(?,?,?,00000000,00000002,76F8E860,100D1450,?,?,00000002,00000000,?,?,1006D341,?), ref: 100766B3
                                                      • MultiByteToWideChar.KERNEL32(?,100D1451,?,00000000,00000000,00000000,76F8E860,100D1450,?,?,00000002,00000000,?,?,1006D341,?), ref: 100766EB
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?), ref: 10076741
                                                      • GetStringTypeW.KERNEL32(?,?,00000000,?,?,?), ref: 10076753
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: StringType$ByteCharMultiWide
                                                      • String ID:
                                                      • API String ID: 3852931651-0
                                                      • Opcode ID: 8c3a540f1c5a1dad22af219246d660a0cf02d367703ae3ac0e1b4397e4b9b5f9
                                                      • Instruction ID: fb157aa580938a6f2ce0ef33c159d9aaebbb260478857121a0e3cf6b023ec7ea
                                                      • Opcode Fuzzy Hash: 8c3a540f1c5a1dad22af219246d660a0cf02d367703ae3ac0e1b4397e4b9b5f9
                                                      • Instruction Fuzzy Hash: 27418B72A0025AAFDF21DF94CC85DEE3FB9FB09794F108429FA16D6150C7399960CBA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 100421A0: CreateDIBitmap.GDI32(?,?,00000004,?,?,00000000), ref: 1004221B
                                                      • CreateCompatibleDC.GDI32(?), ref: 1004228A
                                                      • DeleteObject.GDI32(00000000), ref: 1004229F
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Create$BitmapCompatibleDeleteObject
                                                      • String ID:
                                                      • API String ID: 3709961035-0
                                                      • Opcode ID: 02ce7dd98088216887a03d64c64bea4db2a2adb5612daec675883d701292ada9
                                                      • Instruction ID: d9528a2ea549600bd6fb5c6bacca9fa461586714c02c3b0300d511631e2b0fe2
                                                      • Opcode Fuzzy Hash: 02ce7dd98088216887a03d64c64bea4db2a2adb5612daec675883d701292ada9
                                                      • Instruction Fuzzy Hash: 77315E76604741AFD310DF69CD84F6BB7E8FB88620F504A2EF56983291DB34E805CB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: wsprintf
                                                      • String ID: - $ - [$%d / %d]$?? / %d]
                                                      • API String ID: 2111968516-3107364983
                                                      • Opcode ID: 13c744bb9899887464ec3774ded25b5a28c56871c3533cda84d4f115768c3999
                                                      • Instruction ID: 2b3ea841065ff55b50a0d2b0d4e21cb11e52dabd041e2ab52c854d6f6c89ea29
                                                      • Opcode Fuzzy Hash: 13c744bb9899887464ec3774ded25b5a28c56871c3533cda84d4f115768c3999
                                                      • Instruction Fuzzy Hash: 65318D79108780AFD355DB24CC91FABB7E4EB84720F008A1DF5DA87292DB34A804CB52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • TlsGetValue.KERNEL32(100D0D34,100D0D24,00000000,?,100D0D34,?,1008574B,100D0D24,00000000,?,1006B749,?,?,?,?,?), ref: 100854AD
                                                      • EnterCriticalSection.KERNEL32(100D0D50,00000010,?,1008574B,100D0D24,00000000,?,1006B749,?,?,?,?,?,?), ref: 100854FC
                                                      • LeaveCriticalSection.KERNEL32(100D0D50,00000000,?,1008574B,100D0D24,00000000,?,1006B749,?,?,?,?,?,?), ref: 1008550F
                                                      • LocalAlloc.KERNEL32(00000000,00000003,?,1008574B,100D0D24,00000000,?,1006B749,?,?,?,?,?,?), ref: 10085525
                                                      • LocalReAlloc.KERNEL32(?,00000003,00000002,?,1008574B,100D0D24,00000000,?,1006B749,?,?,?,?,?,?), ref: 10085537
                                                      • TlsSetValue.KERNEL32(100D0D34,00000000), ref: 10085573
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: AllocCriticalLocalSectionValue$EnterLeave
                                                      • String ID:
                                                      • API String ID: 4117633390-0
                                                      • Opcode ID: 6017ab40dc2c040c76012cb03f5a2933508dac76d50d3d2eab9ff2197272713f
                                                      • Instruction ID: 31b8b051d15d45e97407e63531a72aa06790435241f6b31a0cba643ad53eb587
                                                      • Opcode Fuzzy Hash: 6017ab40dc2c040c76012cb03f5a2933508dac76d50d3d2eab9ff2197272713f
                                                      • Instruction Fuzzy Hash: 0A319C71900A0AAFE724CF15C899F6AB7F9FB45362F00C61AE416C7654E771E804CB60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1007E2C8
                                                      • SendMessageA.USER32(?,0000001F,00000000,00000000), ref: 1007E315
                                                      • SendMessageA.USER32(?,0000001F,00000000,00000000), ref: 1007E337
                                                      • GetCapture.USER32 ref: 1007E349
                                                      • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 1007E358
                                                      • WinHelpA.USER32(?,?,?,?), ref: 1007E36C
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CaptureH_prologHelp
                                                      • String ID:
                                                      • API String ID: 432264411-0
                                                      • Opcode ID: 46efed393ffba3c5d7dac9378fd4a9ebd15f95cf1e322f0c432e94761ea49cb8
                                                      • Instruction ID: 2b8d8144d08542dc3b98ce102d3158f01814ebf640395a6d27e091751f2bb593
                                                      • Opcode Fuzzy Hash: 46efed393ffba3c5d7dac9378fd4a9ebd15f95cf1e322f0c432e94761ea49cb8
                                                      • Instruction Fuzzy Hash: 2D21C475600649BFEB21EF64CC8AF6E77A9FF48754F048169F291971E2CB75AC009B10
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetParent.USER32(?), ref: 100837E6
                                                      • GetLastActivePopup.USER32(?), ref: 100837F5
                                                      • IsWindowEnabled.USER32(?), ref: 1008380A
                                                      • EnableWindow.USER32(?,00000000), ref: 1008381D
                                                      • GetWindowLongA.USER32(?,000000F0), ref: 1008382F
                                                      • GetParent.USER32(?), ref: 1008383D
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Window$Parent$ActiveEnableEnabledLastLongPopup
                                                      • String ID:
                                                      • API String ID: 670545878-0
                                                      • Opcode ID: fa2579471e6935f3259fab6fe429870402947aa11bfb78e281af19aebfb2d51c
                                                      • Instruction ID: bcd2d683e676ecd8cde455c2b27a89185b8fd034928e4a20a08169dbf85a22fe
                                                      • Opcode Fuzzy Hash: fa2579471e6935f3259fab6fe429870402947aa11bfb78e281af19aebfb2d51c
                                                      • Instruction Fuzzy Hash: 73114CB2E0572697D6619A698880B1B67D8FFC5ED0F068126F901D3625EF60DD0142E5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • VirtualFree.KERNEL32(0000000C,00100000,00004000,?,?,?,?,1006B6E5,1006B739,?,?,?), ref: 1006FE8A
                                                      • VirtualFree.KERNEL32(0000000C,00000000,00008000,?,?,?,?,1006B6E5,1006B739,?,?,?), ref: 1006FE95
                                                      • HeapFree.KERNEL32(00000000,?,?,?,?,?,1006B6E5,1006B739,?,?,?), ref: 1006FEA2
                                                      • HeapFree.KERNEL32(00000000,?,?,?,?,1006B6E5,1006B739,?,?,?), ref: 1006FEBE
                                                      • VirtualFree.KERNEL32(FFFFFFFF,00000000,00008000,?,?,1006B6E5,1006B739,?,?,?), ref: 1006FEDF
                                                      • HeapDestroy.KERNEL32(?,?,1006B6E5,1006B739,?,?,?), ref: 1006FEF1
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Free$HeapVirtual$Destroy
                                                      • String ID:
                                                      • API String ID: 716807051-0
                                                      • Opcode ID: 29825b41c187de04fa4246487d9e576d45e59d2517b8a340733274bf8debf891
                                                      • Instruction ID: b049f2c683faae663958d6398e333ee5dd880aa4b734f6960ca945f983f97fca
                                                      • Opcode Fuzzy Hash: 29825b41c187de04fa4246487d9e576d45e59d2517b8a340733274bf8debf891
                                                      • Instruction Fuzzy Hash: 5311A131600725BBEB61DB60DCC9FA67BA6F741764F620019FE80671B2CB62BC01CB64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetCursorPos.USER32(?), ref: 1004F262
                                                      • ScreenToClient.USER32(00000001,?), ref: 1004F271
                                                        • Part of subcall function 1004F2F0: DPtoLP.GDI32(?,?,00000001), ref: 1004F407
                                                      • LoadCursorA.USER32(00000000,00007F85), ref: 1004F2A1
                                                      • SetCursor.USER32(00000000), ref: 1004F2A8
                                                      • LoadCursorA.USER32(00000000,00007F84), ref: 1004F2C7
                                                      • SetCursor.USER32(00000000), ref: 1004F2CE
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Cursor$Load$ClientScreen
                                                      • String ID:
                                                      • API String ID: 789353160-0
                                                      • Opcode ID: 6226ff87097659f900a91b34b2d1176c394ad3cc50c989ba76383ae271a4aae0
                                                      • Instruction ID: 10b1bf55fb18dcb1ab77cfdc7b9eee2d99cf6bbbcdc97614ebd710b7dde05e78
                                                      • Opcode Fuzzy Hash: 6226ff87097659f900a91b34b2d1176c394ad3cc50c989ba76383ae271a4aae0
                                                      • Instruction Fuzzy Hash: 2B11A536904712ABD600EF64DD99FAF73A8FB84B11F10452EF545D2280EA74E909CBB7
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageA.USER32(?,0000110A,00000002,?), ref: 1002A5DB
                                                      • SendMessageA.USER32(?,00001101,00000000,00000000), ref: 1002A5ED
                                                      • SendMessageA.USER32(?,0000110A,00000002,?), ref: 1002A5FB
                                                      • SendMessageA.USER32(?,0000110A,00000001,?), ref: 1002A60D
                                                      • SendMessageA.USER32(?,00001101,00000000,00000000), ref: 1002A61F
                                                      • SendMessageA.USER32(?,0000110A,00000001,?), ref: 1002A62D
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: 4c5e129ffdcd7e78db61c091c19e7e85b0b336d35e60ec0d56157d37297d134d
                                                      • Instruction ID: 722a98da71c6062c15135ec83978340cf112dc549a4ceaf4693bc18bfe24267c
                                                      • Opcode Fuzzy Hash: 4c5e129ffdcd7e78db61c091c19e7e85b0b336d35e60ec0d56157d37297d134d
                                                      • Instruction Fuzzy Hash: B00162B2B403053BF534D6659CC6FA3A2EDAF98B91F018619B701EB1C0CAE1EC864630
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetFocus.USER32 ref: 100831BB
                                                        • Part of subcall function 1008305D: GetWindowLongA.USER32(00000000,000000F0), ref: 1008306E
                                                      • GetParent.USER32(00000000), ref: 100831E2
                                                        • Part of subcall function 1008305D: GetClassNameA.USER32(00000000,?,0000000A), ref: 10083089
                                                        • Part of subcall function 1008305D: lstrcmpiA.KERNEL32(?,combobox), ref: 10083098
                                                      • GetWindowLongA.USER32(?,000000F0), ref: 100831FD
                                                      • GetParent.USER32(?), ref: 1008320B
                                                      • GetDesktopWindow.USER32 ref: 1008320F
                                                      • SendMessageA.USER32(00000000,0000014F,00000000,00000000), ref: 10083223
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Window$LongParent$ClassDesktopFocusMessageNameSendlstrcmpi
                                                      • String ID:
                                                      • API String ID: 2818563221-0
                                                      • Opcode ID: 672464cc790ef62259b8c07b8d41a9e7c631fb43493d22990957e1ead52967fa
                                                      • Instruction ID: 9e27b38f62e5ba075410e9eefd7616f34d7801f073062cff5d944d66c48ef08a
                                                      • Opcode Fuzzy Hash: 672464cc790ef62259b8c07b8d41a9e7c631fb43493d22990957e1ead52967fa
                                                      • Instruction Fuzzy Hash: 7AF0AF36E01A3266E21296255C89B6F6398FFC5AD0F518217F915B61F0DB14DD0185E4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ClientToScreen.USER32(?,?), ref: 100830E1
                                                      • GetWindow.USER32(?,00000005), ref: 100830F2
                                                      • GetDlgCtrlID.USER32(00000000), ref: 100830FB
                                                      • GetWindowLongA.USER32(00000000,000000F0), ref: 1008310A
                                                      • GetWindowRect.USER32(00000000,?), ref: 1008311C
                                                      • PtInRect.USER32(?,?,?), ref: 1008312C
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Window$Rect$ClientCtrlLongScreen
                                                      • String ID:
                                                      • API String ID: 1315500227-0
                                                      • Opcode ID: 49eedd194ff37cd2992ed4eb9bfa351e69ffb58ca0d50fd57d032748d0df1d6b
                                                      • Instruction ID: 4fc5ff52c44a027167f352d4454926a457cf405d2545a95b9ecdbabdf4e004ed
                                                      • Opcode Fuzzy Hash: 49eedd194ff37cd2992ed4eb9bfa351e69ffb58ca0d50fd57d032748d0df1d6b
                                                      • Instruction Fuzzy Hash: 3C01A231D0056AABEB129F54CC49EAEB76CFF85B50F008122F911D11B1E734CA058B90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetSystemMetrics.USER32(0000000B), ref: 10081BCE
                                                      • GetSystemMetrics.USER32(0000000C), ref: 10081BD5
                                                      • GetDC.USER32(00000000), ref: 10081BEE
                                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 10081BFF
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 10081C07
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 10081C0F
                                                        • Part of subcall function 1008638B: GetSystemMetrics.USER32(00000002), ref: 1008639D
                                                        • Part of subcall function 1008638B: GetSystemMetrics.USER32(00000003), ref: 100863A7
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MetricsSystem$CapsDevice$Release
                                                      • String ID:
                                                      • API String ID: 1151147025-0
                                                      • Opcode ID: 19d0e5be1bc36bff51874c9bb098bebdff2bfc132b323a3497bfb7078d2fe2c5
                                                      • Instruction ID: bca4308b8dc531cc9a3e9d1c2a58a5c9cab33357fabe16797004321951d25ca7
                                                      • Opcode Fuzzy Hash: 19d0e5be1bc36bff51874c9bb098bebdff2bfc132b323a3497bfb7078d2fe2c5
                                                      • Instruction Fuzzy Hash: 17F05434940B14AAF320AB728C89F5777E8FF85752F11442BF60187291DA709805CFA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CountPathTempTickwsprintf
                                                      • String ID: %x.tmp$\
                                                      • API String ID: 1217417767-877638825
                                                      • Opcode ID: 24b912923e3803d7c7994482130be1ac46e4e21cb3efcaad42c89b72020b076b
                                                      • Instruction ID: 7df2a8f247c5f74d2f3df27076c1b98d3019140ca363c6e95b8d2eac18b6860c
                                                      • Opcode Fuzzy Hash: 24b912923e3803d7c7994482130be1ac46e4e21cb3efcaad42c89b72020b076b
                                                      • Instruction Fuzzy Hash: E8410336604A044BD328CA79A9515AFB7D5FBD4220F950B6EF96BC72D0EEB0DE08C244
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetVersionExA.KERNEL32 ref: 1006FCCC
                                                      • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 1006FD01
                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1006FD61
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: EnvironmentFileModuleNameVariableVersion
                                                      • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                      • API String ID: 1385375860-4131005785
                                                      • Opcode ID: e3482eb7e5446a686d5f3a0293efde40a8af57dbc89c6804fced29f75cc00e76
                                                      • Instruction ID: d3d319ec80873dd3b5b13423c6690fe120520f70a50ef6841f7b67c7141b9ea1
                                                      • Opcode Fuzzy Hash: e3482eb7e5446a686d5f3a0293efde40a8af57dbc89c6804fced29f75cc00e76
                                                      • Instruction Fuzzy Hash: 4D313771D422986EEB61C6709C81BFD77ABDF06384FA004DED585D6042E630BECACB11
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageA.USER32(00000000,00000405,00000000,?), ref: 1007DD6A
                                                      • GetWindowLongA.USER32(?,000000FC), ref: 1007DD7B
                                                      • GetWindowLongA.USER32(?,000000FC), ref: 1007DD8B
                                                      • SetWindowLongA.USER32(?,000000FC,?), ref: 1007DDA7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: LongWindow$MessageSend
                                                      • String ID: (
                                                      • API String ID: 2178440468-3887548279
                                                      • Opcode ID: 53cda3cf389c15cc3030a97e94f9e93c0db7319e19be80099377a0f9b89bfc47
                                                      • Instruction ID: 6c18d1eca4585522d11afd16ad602fc2af98c3ec180a41dbf518f7f643014a0a
                                                      • Opcode Fuzzy Hash: 53cda3cf389c15cc3030a97e94f9e93c0db7319e19be80099377a0f9b89bfc47
                                                      • Instruction Fuzzy Hash: 9A31A136A00A019FDB21EF64C884B59BBF5FF44350F12816BE582A7691DB75FC44CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetModuleFileNameA.KERNEL32(?,?,00000104,?,?,00000000), ref: 1008602D
                                                        • Part of subcall function 10086119: lstrlenA.KERNEL32(?,00000000,?), ref: 10086150
                                                      • lstrcpyA.KERNEL32(?,.HLP,?,?,00000104), ref: 100860CE
                                                      • lstrcatA.KERNEL32(?,.INI,?,?,00000104), ref: 100860FB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: FileModuleNamelstrcatlstrcpylstrlen
                                                      • String ID: .HLP$.INI
                                                      • API String ID: 2421895198-3011182340
                                                      • Opcode ID: 4173a0efb17b45646bb44eff62e65415103f6902e5d1c266aed2eab850e40f5b
                                                      • Instruction ID: 104d0d450b3e5cb038a62b85be081ecdf68fe906f63540b5f6d54dd82cee8fb3
                                                      • Opcode Fuzzy Hash: 4173a0efb17b45646bb44eff62e65415103f6902e5d1c266aed2eab850e40f5b
                                                      • Instruction Fuzzy Hash: DC314E759047199FEB21DBB0DC85BC6B7F8FB08311F10496AE199D2151EB70A984CF54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GlobalLock.KERNEL32(?), ref: 10040F10
                                                      • GlobalSize.KERNEL32(?), ref: 10040F33
                                                      • GlobalSize.KERNEL32(?), ref: 10040F63
                                                      • GlobalUnlock.KERNEL32(?,00000000,00000000), ref: 10040F73
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Global$Size$LockUnlock
                                                      • String ID: BM
                                                      • API String ID: 2233901773-2348483157
                                                      • Opcode ID: 5f835d1f3f60016779dc1a864f71ee2e3b042e2781173aae830b534a7620f65b
                                                      • Instruction ID: 5d8f25dbc667272b350e463b96a4512c9631343165b89119ccdb4f6c274c86b4
                                                      • Opcode Fuzzy Hash: 5f835d1f3f60016779dc1a864f71ee2e3b042e2781173aae830b534a7620f65b
                                                      • Instruction Fuzzy Hash: 7A21C876D00658ABD710DFA8CC81BDEFBB8FF09720F504269E819E3391D734690087A5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: wsprintf$ClassInfo
                                                      • String ID: Afx:%x:%x$Afx:%x:%x:%x:%x:%x
                                                      • API String ID: 845911565-79760390
                                                      • Opcode ID: bb078c04b577211925f50aff3bc539b5d325bb40aebdf66a6bbc35256c873ee6
                                                      • Instruction ID: 0a2c1256f600960077083aebbe527ca380818eeeaaa049658569a8f6a5d86f5b
                                                      • Opcode Fuzzy Hash: bb078c04b577211925f50aff3bc539b5d325bb40aebdf66a6bbc35256c873ee6
                                                      • Instruction Fuzzy Hash: 19213BB1D0125AAFCB01DF99CC859DE7BB8FF4D354B00402AFA44A2212E3349A11CBA6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • Shell_NotifyIconA.SHELL32(00000001,?,?,00000058), ref: 10038F29
                                                      • DestroyCursor.USER32(?), ref: 10038F36
                                                      • Shell_NotifyIconA.SHELL32(?,?,00000000,00000058), ref: 10038F69
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_$CursorDestroy
                                                      • String ID: X$d
                                                      • API String ID: 3039372612-651813629
                                                      • Opcode ID: 4d10007af471a71bd8a7cf4641d0a4e33fbe4a8d1fe394fa704f323af2313992
                                                      • Instruction ID: cb2871811ababe86e5bd68a1e68f34f76fbe330eb03f6f153ce6e887b0961981
                                                      • Opcode Fuzzy Hash: 4d10007af471a71bd8a7cf4641d0a4e33fbe4a8d1fe394fa704f323af2313992
                                                      • Instruction Fuzzy Hash: 832158B56087009FE301DF15C844B9BBBE5FBC4745F00892EF9C897250EBB0AA088B92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetWindowLongA.USER32(?,000000F0), ref: 1007C848
                                                      • GetDlgItem.USER32(?,00000002), ref: 1007C867
                                                      • IsWindowEnabled.USER32(00000000), ref: 1007C872
                                                      • SendMessageA.USER32(?,00000111,00000002,00000000), ref: 1007C888
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Window$EnabledItemLongMessageSend
                                                      • String ID: Edit
                                                      • API String ID: 3499652902-554135844
                                                      • Opcode ID: 49cbb1cf80d7415d02c721a4afdabf6b47031a7752adfd280646c3c0fb24119a
                                                      • Instruction ID: 8237389717aaab78d38969f36872f414dfe236e0457cd428480d1f143668f735
                                                      • Opcode Fuzzy Hash: 49cbb1cf80d7415d02c721a4afdabf6b47031a7752adfd280646c3c0fb24119a
                                                      • Instruction Fuzzy Hash: 1401C03460071AAAEAA19A60DC49F6AA7E4FF40790F11C43EF981E64E1CF78ED50C55A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect$Client$Copy
                                                      • String ID:
                                                      • API String ID: 472922470-0
                                                      • Opcode ID: 6231b4235439df912bfaaf9951ddcd36cf046da1338122f06f8b6844946e4235
                                                      • Instruction ID: 8f436be72868453298a899b50f9ea99a700e55434eb8b38550f2e8e16315a027
                                                      • Opcode Fuzzy Hash: 6231b4235439df912bfaaf9951ddcd36cf046da1338122f06f8b6844946e4235
                                                      • Instruction Fuzzy Hash: 97815C752087459FD364DF64C890B6FB3E5FBC8700F204A2DF596C3252EB70A9098BA6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsWindow.USER32(?), ref: 1003BA8C
                                                      • SendMessageA.USER32(?,00008003,00000000,00000000), ref: 1003BAA3
                                                      • GetWindowRect.USER32(?,00000000), ref: 1003BAF5
                                                      • GetClientRect.USER32(?,00000000), ref: 1003BB4D
                                                      • GetWindowRect.USER32(?,00000000), ref: 1003BB71
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: RectWindow$ClientMessageSend
                                                      • String ID:
                                                      • API String ID: 1071774122-0
                                                      • Opcode ID: 329f41a0b768cc01eef5f9be3b0ff1408f5ef6f0af225a8da8199d9f80301742
                                                      • Instruction ID: 64a58f2df9d631e2b6060dae6252178032b975109e35b3287c00e0265e4c3bf8
                                                      • Opcode Fuzzy Hash: 329f41a0b768cc01eef5f9be3b0ff1408f5ef6f0af225a8da8199d9f80301742
                                                      • Instruction Fuzzy Hash: F761BD75908B559FC311CF64D880A6FBBE8FF88744F014A1DFA859B291DB70EA05CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect$ClientCreateEmptyFill
                                                      • String ID:
                                                      • API String ID: 97219908-0
                                                      • Opcode ID: 23142313e50d2e7e7c0bbb34f2ef54c94dc1a958365761e009332bdd72146493
                                                      • Instruction ID: 147724b0c6c9159d7b65d02804ce098db3ff012dc11588237200de1189d91253
                                                      • Opcode Fuzzy Hash: 23142313e50d2e7e7c0bbb34f2ef54c94dc1a958365761e009332bdd72146493
                                                      • Instruction Fuzzy Hash: 2C5145B5604742AFD704DF65C885A6BB7E8FF88604F40891EB95683240EB34FC08CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetStartupInfoA.KERNEL32(?), ref: 1006F696
                                                      • GetFileType.KERNEL32(00000480), ref: 1006F741
                                                      • GetStdHandle.KERNEL32(-000000F6), ref: 1006F7A4
                                                      • GetFileType.KERNEL32(00000000), ref: 1006F7B2
                                                      • SetHandleCount.KERNEL32 ref: 1006F7E9
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: FileHandleType$CountInfoStartup
                                                      • String ID:
                                                      • API String ID: 1710529072-0
                                                      • Opcode ID: 2e32a59e8018a813c791bba22316fd0dfb48ba3505e2a55b293f6a98b1286846
                                                      • Instruction ID: c0c70550afe2d899b9aeb07e0d61ebb970b6babd87f894697888fb47d5036540
                                                      • Opcode Fuzzy Hash: 2e32a59e8018a813c791bba22316fd0dfb48ba3505e2a55b293f6a98b1286846
                                                      • Instruction Fuzzy Hash: C75124719087528FD720CB68C8887693BE2FF017A8FA5466DD892DB2E1DB30D805CB60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsWindow.USER32(?), ref: 10039BF0
                                                      • WinHelpA.USER32(?,00000000,00000002,00000000), ref: 10039C0B
                                                      • GetMenu.USER32(?), ref: 10039C1B
                                                      • SetMenu.USER32(?,00000000), ref: 10039C28
                                                      • DestroyMenu.USER32(00000000), ref: 10039C33
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Menu$DestroyHelpWindow
                                                      • String ID:
                                                      • API String ID: 427501538-0
                                                      • Opcode ID: b2649649c76833744db59d91f988f870378c4347facf52d1f26030884282d102
                                                      • Instruction ID: 86ee94783d97eb484cd6d62288c56a272357da256e48077ffa5646f3c0079369
                                                      • Opcode Fuzzy Hash: b2649649c76833744db59d91f988f870378c4347facf52d1f26030884282d102
                                                      • Instruction Fuzzy Hash: 30310679A00619AFC306DF65DC85E6BF7EDFF45285F01060DF9059B241DB35B8008BA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • midiStreamStop.WINMM(?,00000000,?,00000000,10044F5A,00000000,100CE570,1003BF76,100CE570,?,10036D1F,100CE570,10034CE3,00000001,00000000,000000FF), ref: 10045425
                                                      • midiOutReset.WINMM(?,?,10036D1F,100CE570,10034CE3,00000001,00000000,000000FF,?,?,100CE570,?,1003C491,?,?,10034395), ref: 10045443
                                                      • WaitForSingleObject.KERNEL32(?,000007D0,?,10036D1F,100CE570,10034CE3,00000001,00000000,000000FF,?,?,100CE570,?,1003C491,?), ref: 10045466
                                                      • midiStreamClose.WINMM(?,?,10036D1F,100CE570,10034CE3,00000001,00000000,000000FF,?,?,100CE570,?,1003C491,?,?,10034395), ref: 100454A3
                                                      • midiStreamClose.WINMM(?,?,10036D1F,100CE570,10034CE3,00000001,00000000,000000FF,?,?,100CE570,?,1003C491,?,?,10034395), ref: 100454D7
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: midi$Stream$Close$ObjectResetSingleStopWait
                                                      • String ID:
                                                      • API String ID: 3142198506-0
                                                      • Opcode ID: dd2bad7402e987cc60add1821fe62c02b7d725841f75d2340826225c9c878aa0
                                                      • Instruction ID: cffc21970615f5ae777a818c2729f839b161e6f9bf451f2c3ac755d14fbf8c93
                                                      • Opcode Fuzzy Hash: dd2bad7402e987cc60add1821fe62c02b7d725841f75d2340826225c9c878aa0
                                                      • Instruction Fuzzy Hash: 23314EB2600A518BD720DFA8C4C455AB7E5FFC4247B21493FE282CA942D775E885CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsWindow.USER32(?), ref: 10035EA0
                                                      • GetMenu.USER32(?), ref: 10035EAF
                                                      • DestroyAcceleratorTable.USER32(?), ref: 10035EFC
                                                      • SetMenu.USER32(?,00000000), ref: 10035F11
                                                      • DestroyMenu.USER32(?,?,?,100322F4,?), ref: 10035F21
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Menu$Destroy$AcceleratorTableWindow
                                                      • String ID:
                                                      • API String ID: 1240299919-0
                                                      • Opcode ID: 6ce1b9d5ad63ab8ae9dcd31a8258f725a73466e2aed20874f8ce5da1ec80152f
                                                      • Instruction ID: 42cd9882139e30d9371f9f839408ca1643d4a1b5004b5ac475d2e9d67ce2339a
                                                      • Opcode Fuzzy Hash: 6ce1b9d5ad63ab8ae9dcd31a8258f725a73466e2aed20874f8ce5da1ec80152f
                                                      • Instruction Fuzzy Hash: 4431C0BAA04206AFC611DF65DC85D6B77A9EF84795F024A2DFC0597252EA30F805CBB0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsChild.USER32(?,?), ref: 1003B85C
                                                        • Part of subcall function 10030780: IsChild.USER32(?,?), ref: 100307FD
                                                        • Part of subcall function 10030780: GetParent.USER32(?), ref: 10030817
                                                      • GetCursorPos.USER32(?), ref: 1003B874
                                                      • GetClientRect.USER32(?,?), ref: 1003B883
                                                      • PtInRect.USER32(?,?,?), ref: 1003B8A4
                                                      • SetCursor.USER32(?,?,00000000,?,?,?,?,1003B4D0), ref: 1003B922
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ChildCursorRect$ClientParent
                                                      • String ID:
                                                      • API String ID: 1110532797-0
                                                      • Opcode ID: 5d779efc7d99933da258296c94296bcbbd45d851c50ed865798d725d2b323b71
                                                      • Instruction ID: b34aa1f77e1fe81247349dff3cb26c781d2fe179579be2a5ecff0c15275be812
                                                      • Opcode Fuzzy Hash: 5d779efc7d99933da258296c94296bcbbd45d851c50ed865798d725d2b323b71
                                                      • Instruction Fuzzy Hash: 6121F535A00B126FD722DF64CC85F5B73ECEF94655F010A1AFA49A7281EA30F80287A1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 10079E37
                                                      • GetParent.USER32(?), ref: 10079E74
                                                      • SendMessageA.USER32(?,00000464,00000104,00000000), ref: 10079E9C
                                                      • GetParent.USER32(?), ref: 10079EC5
                                                      • SendMessageA.USER32(?,00000465,00000104,00000000), ref: 10079EE2
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MessageParentSend$H_prolog
                                                      • String ID:
                                                      • API String ID: 1056721960-0
                                                      • Opcode ID: b689d84ccd604c9f8f78cbb15b68d5f3ba9d693a274f0033ae83c27db071fbf2
                                                      • Instruction ID: 30d0d9cab612ef1f102f7e436923ba4b710a87f8c952c68ae051d352b0c6e32a
                                                      • Opcode Fuzzy Hash: b689d84ccd604c9f8f78cbb15b68d5f3ba9d693a274f0033ae83c27db071fbf2
                                                      • Instruction Fuzzy Hash: 6F317E7490061AEBCB04DFA4CC85FAEB779FF00364F108529F561A71E2DB78AA05CB58
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 1007A530: SendMessageA.USER32(?,0000110C,00000000,00000040), ref: 1007A551
                                                      • SendMessageA.USER32(?,0000110A,00000004,?), ref: 1002A565
                                                      • SendMessageA.USER32(?,0000110A,00000004,00000000), ref: 1002A585
                                                      • SendMessageA.USER32(?,00001101,00000000,00000000), ref: 1002A597
                                                      • SendMessageA.USER32(?,0000110A,00000004,00000000), ref: 1002A5A5
                                                      • SendMessageA.USER32(?,00001101,00000000,00000000), ref: 1002A5B7
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: 6e31905a36460471f0d7b76499ed861599c277cbfa51e0536f8f65f7fa03b30e
                                                      • Instruction ID: d11da582b7db4532b8d96fc0aeb58f8ce5f872545b110f96f3be0dae045cde49
                                                      • Opcode Fuzzy Hash: 6e31905a36460471f0d7b76499ed861599c277cbfa51e0536f8f65f7fa03b30e
                                                      • Instruction Fuzzy Hash: 94018FB2740B117BE524D6A55CC1F67A2ECDFD5BA6F024519F701A71C0DAE4EC424670
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 1007E12D
                                                      • GetClassInfoA.USER32(?,?,?), ref: 1007E148
                                                      • RegisterClassA.USER32(00000000), ref: 1007E153
                                                      • lstrcatA.KERNEL32(00000034,?,00000001), ref: 1007E18A
                                                      • lstrcatA.KERNEL32(00000034,?), ref: 1007E198
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Classlstrcat$H_prologInfoRegister
                                                      • String ID:
                                                      • API String ID: 106226465-0
                                                      • Opcode ID: 2a374b103b61b55af5e6418126d98fe8e84dfdc8a8547d3945e347046eea219f
                                                      • Instruction ID: d2f6cda51c93bdca4a0bb18c317341d5189a0fffd346971793b3155e82ce6c55
                                                      • Opcode Fuzzy Hash: 2a374b103b61b55af5e6418126d98fe8e84dfdc8a8547d3945e347046eea219f
                                                      • Instruction Fuzzy Hash: 89114435D02648BEEB00DFA4CC42B9E7BB8FF08310F00805BF841A7152D774AA048B61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetLastError.KERNEL32(00000103,7FFFFFFF,1006EDAF,1006ECE9,00000000,?,?,00000000,00000001), ref: 1006F533
                                                      • TlsGetValue.KERNEL32 ref: 1006F541
                                                      • SetLastError.KERNEL32(00000000), ref: 1006F58D
                                                        • Part of subcall function 1007542E: HeapAlloc.KERNEL32(00000008,?,00000000,00000000,00000001,10074AD4,100AA600,000000FF,?,1006F556,00000001,00000074), ref: 10075524
                                                      • TlsSetValue.KERNEL32(00000000), ref: 1006F565
                                                      • GetCurrentThreadId.KERNEL32 ref: 1006F576
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastValue$AllocCurrentHeapThread
                                                      • String ID:
                                                      • API String ID: 2020098873-0
                                                      • Opcode ID: 74bb6db351017f9384cad3f2e45e86302edaf28f2ba454e25b0865e818294d3f
                                                      • Instruction ID: 17fbeac5757b48a88d17a7f5b28f27d9390c65f34d16a978bc7013eabc7e7e2c
                                                      • Opcode Fuzzy Hash: 74bb6db351017f9384cad3f2e45e86302edaf28f2ba454e25b0865e818294d3f
                                                      • Instruction Fuzzy Hash: 12F09636901E729BE2326F349C8966E3A95FF446A2B11071DFA52D71A1CB649D408690
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • TlsFree.KERNEL32(00000000,?,?,10085874,00000000,00000001), ref: 100852E8
                                                      • GlobalHandle.KERNEL32(02EE1FC8), ref: 10085310
                                                      • GlobalUnlock.KERNEL32(00000000,?,?,10085874,00000000,00000001), ref: 10085319
                                                      • GlobalFree.KERNEL32(00000000), ref: 10085320
                                                      • DeleteCriticalSection.KERNEL32(100D0D18,?,?,10085874,00000000,00000001), ref: 1008532A
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Global$Free$CriticalDeleteHandleSectionUnlock
                                                      • String ID:
                                                      • API String ID: 2159622880-0
                                                      • Opcode ID: 13bdea7e82e984b4e2aacbcea5e215bdb09b41ea53af89131eae2bc4f1fef4ac
                                                      • Instruction ID: 62fe2fc949d916e3dc81169314eac80b990f362cb9519aef4305a4c666c1f865
                                                      • Opcode Fuzzy Hash: 13bdea7e82e984b4e2aacbcea5e215bdb09b41ea53af89131eae2bc4f1fef4ac
                                                      • Instruction Fuzzy Hash: 12F05E31E00A209BE6129F399C88A6E77FDFF866A2756050BF811D72A5DF61DC018760
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • DeleteCriticalSection.KERNEL32(00000000,?,?,1006F505,1006B6E0,1006B739,?,?,?), ref: 10072598
                                                        • Part of subcall function 1006CEAE: HeapFree.KERNEL32(00000000,?,?,?,?), ref: 1006CF82
                                                      • DeleteCriticalSection.KERNEL32(?,?,1006F505,1006B6E0,1006B739,?,?,?), ref: 100725B3
                                                      • DeleteCriticalSection.KERNEL32 ref: 100725BB
                                                      • DeleteCriticalSection.KERNEL32 ref: 100725C3
                                                      • DeleteCriticalSection.KERNEL32 ref: 100725CB
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CriticalDeleteSection$FreeHeap
                                                      • String ID:
                                                      • API String ID: 447823528-0
                                                      • Opcode ID: e4d9b3e4817a0c54ff53d8cfd3a86863f77b259b7ebc616a7240b19a9bf10aa6
                                                      • Instruction ID: 25a38064d9bfded0ec9c0e72a539d61deba64e2a85cb3314bfdc4d1e69b9bb61
                                                      • Opcode Fuzzy Hash: e4d9b3e4817a0c54ff53d8cfd3a86863f77b259b7ebc616a7240b19a9bf10aa6
                                                      • Instruction Fuzzy Hash: A4F0893DC00E646BDA70FF1ACC9BDB96F61DED0250347827EDA82A3130C53B6C508A90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • wsprintfA.USER32 ref: 100503EF
                                                      • CreateFontIndirectA.GDI32(00000028), ref: 10050458
                                                      • GetTextExtentPoint32A.GDI32(?,?,?,?), ref: 1005049F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CreateExtentFontIndirectPoint32Textwsprintf
                                                      • String ID: (
                                                      • API String ID: 3175173087-3887548279
                                                      • Opcode ID: 4b73e1da61ebdff4505e559e85e0e84603b2db7b992fc6016faaf92ed47515d9
                                                      • Instruction ID: 1e3625d8098e1fec0d49aad9b40ab3342f9d9799b4c84a80e7aaaba51c5afb58
                                                      • Opcode Fuzzy Hash: 4b73e1da61ebdff4505e559e85e0e84603b2db7b992fc6016faaf92ed47515d9
                                                      • Instruction Fuzzy Hash: BF51AC756087458FC324DF28C894B6FBBE5FF88314F104A1DF59A87281DBB5A909CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GlobalLock.KERNEL32 ref: 100819EE
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000020), ref: 10081A41
                                                      • GlobalUnlock.KERNEL32(?), ref: 10081AD8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Global$ByteCharLockMultiUnlockWide
                                                      • String ID: @
                                                      • API String ID: 231414890-2766056989
                                                      • Opcode ID: 18a7b72d9db1af6cf3e359e52656c629a3d87732fd27adff66aff6734882e1f6
                                                      • Instruction ID: 6da37c91cb29cda4851427dde64a6ee590d932d1b2f640a57a31d621048f3854
                                                      • Opcode Fuzzy Hash: 18a7b72d9db1af6cf3e359e52656c629a3d87732fd27adff66aff6734882e1f6
                                                      • Instruction Fuzzy Hash: E441F876D0021AEFDF15CFA4C8819EEBBB9FF40354F10816AE815AB244D730AA46CF90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetMenuCheckMarkDimensions.USER32 ref: 10085C90
                                                      • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 10085D3F
                                                      • LoadBitmapA.USER32(00000000,00007FE3), ref: 10085D57
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Bitmap$CheckCreateDimensionsLoadMarkMenu
                                                      • String ID:
                                                      • API String ID: 2596413745-3916222277
                                                      • Opcode ID: fa0ec8aa110924bb07b07413bbf9dc7bfcae7d1b9e82b4ebce68d0160258f447
                                                      • Instruction ID: d1f44689718573f5446cf5c7acd5d52ce968988154be7af351faea39036d300e
                                                      • Opcode Fuzzy Hash: fa0ec8aa110924bb07b07413bbf9dc7bfcae7d1b9e82b4ebce68d0160258f447
                                                      • Instruction Fuzzy Hash: 67213771E00325AFEB10DFB8CCC9BAD7BB8FB44751F1541A7E805EB282D6719A448B50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 10079BF5: __EH_prolog.LIBCMT ref: 10079BFA
                                                        • Part of subcall function 10079BF5: lstrcpynA.KERNEL32(?,?,00000104), ref: 10079CE7
                                                        • Part of subcall function 10079D57: lstrlenA.KERNEL32(?,?,?,0000000C,?,?,10040299,?,-00000001,00000000,?,?,?,100BCBD8), ref: 10079D61
                                                        • Part of subcall function 10079D57: GetFocus.USER32 ref: 10079D7C
                                                        • Part of subcall function 10079D57: IsWindowEnabled.USER32(?), ref: 10079DA5
                                                        • Part of subcall function 10079D57: EnableWindow.USER32(?,00000000), ref: 10079DB7
                                                        • Part of subcall function 10079D57: GetOpenFileNameA.COMDLG32(?,?), ref: 10079DE2
                                                        • Part of subcall function 10079D57: EnableWindow.USER32(?,00000001), ref: 10079E00
                                                        • Part of subcall function 10079D57: IsWindow.USER32(?), ref: 10079E06
                                                        • Part of subcall function 10079D57: SetFocus.USER32(?), ref: 10079E14
                                                        • Part of subcall function 10079E32: __EH_prolog.LIBCMT ref: 10079E37
                                                        • Part of subcall function 10079E32: GetParent.USER32(?), ref: 10079E74
                                                        • Part of subcall function 10079E32: SendMessageA.USER32(?,00000464,00000104,00000000), ref: 10079E9C
                                                        • Part of subcall function 10079E32: GetParent.USER32(?), ref: 10079EC5
                                                        • Part of subcall function 10079E32: SendMessageA.USER32(?,00000465,00000104,00000000), ref: 10079EE2
                                                        • Part of subcall function 1007FE87: SetWindowTextA.USER32(?,1003E9DA), ref: 1007FE95
                                                        • Part of subcall function 1007BBAF: InterlockedDecrement.KERNEL32(-000000F4), ref: 1007BBC3
                                                      • SendMessageA.USER32(?,000000B1,00000000,000000FF), ref: 1005A5ED
                                                      • SendMessageA.USER32(?,000000B7,00000000,00000000), ref: 1005A5FC
                                                        • Part of subcall function 1007FFC2: SetFocus.USER32(?,10084191), ref: 1007FFCC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSend$Focus$EnableH_prologParent$DecrementEnabledFileInterlockedNameOpenTextlstrcpynlstrlen
                                                      • String ID: out.prn$prn
                                                      • API String ID: 4074345921-3109735852
                                                      • Opcode ID: a461a149a334bf2bceb8b3ba3fee1dd6dc7ba91dc1cfda67c6f84b0601acac48
                                                      • Instruction ID: a53202c718e3ca02736cd513245dc28f804b64f6c917f0ececd083c68ace699a
                                                      • Opcode Fuzzy Hash: a461a149a334bf2bceb8b3ba3fee1dd6dc7ba91dc1cfda67c6f84b0601acac48
                                                      • Instruction Fuzzy Hash: D721AE39108380ABD234EB14CC86F9BB7A4EB84720F108A1DB5E9572D2CBB86544CB56
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetClassInfoA.USER32(?,WTWindow,?), ref: 100375D8
                                                      • LoadCursorA.USER32(00000000,00007F00), ref: 100375E9
                                                      • GetStockObject.GDI32(00000005), ref: 100375F3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ClassCursorInfoLoadObjectStock
                                                      • String ID: WTWindow
                                                      • API String ID: 1762135420-3503404378
                                                      • Opcode ID: dd4979b89de8d1107b28f0dd6407b86054333eea3e6c10d4f1deb28bcab1fb78
                                                      • Instruction ID: 95c9d422a3a85ce347b73f7d41aac06d5f71bb049a3025787246d383d91fffac
                                                      • Opcode Fuzzy Hash: dd4979b89de8d1107b28f0dd6407b86054333eea3e6c10d4f1deb28bcab1fb78
                                                      • Instruction Fuzzy Hash: 4411AC70909752AFE301DF168C85A0BBBE8FF88351F41082EF88897221D7349905CB82
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetWindowLongA.USER32(00000000,000000F0), ref: 1008306E
                                                      • GetClassNameA.USER32(00000000,?,0000000A), ref: 10083089
                                                      • lstrcmpiA.KERNEL32(?,combobox), ref: 10083098
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ClassLongNameWindowlstrcmpi
                                                      • String ID: combobox
                                                      • API String ID: 2054663530-2240613097
                                                      • Opcode ID: 6af4b86342b07274d0175a2ae4195d436e815e05836d3d7268c47405dbd1eea5
                                                      • Instruction ID: eb765ab10b0f57bc19b05e2fee042149cd8a70450c42e4b14a084e58e1322f3f
                                                      • Opcode Fuzzy Hash: 6af4b86342b07274d0175a2ae4195d436e815e05836d3d7268c47405dbd1eea5
                                                      • Instruction Fuzzy Hash: 80E03931D14518BBDF01EB60CC8AB993BA8FB00341F108122F913D50A1DA30E645CA51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(KERNEL32,1006B7D3), ref: 100700DB
                                                      • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 100700EB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: IsProcessorFeaturePresent$KERNEL32
                                                      • API String ID: 1646373207-3105848591
                                                      • Opcode ID: 558beba788bfccbcab5f78dd8d725602ecbce076e6badb5f20fd3369df2fa2a3
                                                      • Instruction ID: 63ba9782388d9cb75e95a0f79024c9aea6881c4242fd74a1e8c27b38ebd71f67
                                                      • Opcode Fuzzy Hash: 558beba788bfccbcab5f78dd8d725602ecbce076e6badb5f20fd3369df2fa2a3
                                                      • Instruction Fuzzy Hash: 14C08CB4A40313E2EEB2DBF10C48B2B2388FB02B93F058100F587D01C0CF19E240E168
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 620efcfdb2283eb8ea11a34196cda8f0597f8713414ac6e7ba1ef4c2c149e286
                                                      • Instruction ID: c2f6297e83653284c2583bbe26a58b3a4ce1d1315714fd7520874ae53e380031
                                                      • Opcode Fuzzy Hash: 620efcfdb2283eb8ea11a34196cda8f0597f8713414ac6e7ba1ef4c2c149e286
                                                      • Instruction Fuzzy Hash: 9091F771D01BA5ABDB11DB68CC84ACE7BB6EB047E4F214222F855B6191EB319E40CB64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • HeapAlloc.KERNEL32(00000000,00002020,100BF890,100BF890,?,?,100748C8,?,00000010,?,00000009,00000009,?,1006D081,00000010,?), ref: 1007441D
                                                      • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,?,100748C8,?,00000010,?,00000009,00000009,?,1006D081,00000010,?), ref: 10074441
                                                      • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,?,100748C8,?,00000010,?,00000009,00000009,?,1006D081,00000010,?), ref: 1007445B
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,100748C8,?,00000010,?,00000009,00000009,?,1006D081,00000010,?,?), ref: 1007451C
                                                      • HeapFree.KERNEL32(00000000,00000000,?,?,100748C8,?,00000010,?,00000009,00000009,?,1006D081,00000010,?,?,?), ref: 10074533
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: AllocVirtual$FreeHeap
                                                      • String ID:
                                                      • API String ID: 714016831-0
                                                      • Opcode ID: 7a328bf683f4111558bceeb7e19c84d8abbb1b4d000b6e3a3a42cf11328a49e8
                                                      • Instruction ID: 71f70dce472c096b114f09bf1e4b333c4ba3f71368041318a107e9d9c89af8d3
                                                      • Opcode Fuzzy Hash: 7a328bf683f4111558bceeb7e19c84d8abbb1b4d000b6e3a3a42cf11328a49e8
                                                      • Instruction Fuzzy Hash: 99313574640B159FE331CF28CC85B7577E4F744794F12C22AE59997290DFB8A800C758
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • midiStreamOpen.WINMM(?,?,00000001,10046390,?,00030000,?,?,?,00000000), ref: 10045D7B
                                                      • midiStreamProperty.WINMM ref: 10045E62
                                                      • midiOutPrepareHeader.WINMM(?,?,00000040,00000001,?,?,?,?,00000000), ref: 10045FB0
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: midi$Stream$HeaderOpenPrepareProperty
                                                      • String ID:
                                                      • API String ID: 2061886437-0
                                                      • Opcode ID: e470d4f7005ed06a00f75eaf39cb814e8e2c627ddd454937fa4bf8cc6c9ba40a
                                                      • Instruction ID: 3809825bb7c11ebdae248358cc73cf35cade28c1d3c4f2dba3e372e8035b371a
                                                      • Opcode Fuzzy Hash: e470d4f7005ed06a00f75eaf39cb814e8e2c627ddd454937fa4bf8cc6c9ba40a
                                                      • Instruction Fuzzy Hash: 30A17D756006068FD724CF28D890BAAB7F6FB88304F51493EE686C7651EB36F919CB41
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 100826D0: __EH_prolog.LIBCMT ref: 100826D5
                                                        • Part of subcall function 100826D0: BeginPaint.USER32(?,?,?,?,10026739), ref: 100826FE
                                                      • GetClientRect.USER32(?,?), ref: 10044256
                                                      • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 100442AB
                                                      • __ftol.LIBCMT ref: 10044382
                                                      • __ftol.LIBCMT ref: 1004438F
                                                        • Part of subcall function 10055B30: GetClientRect.USER32(?,?), ref: 10055B57
                                                        • Part of subcall function 10055B30: __ftol.LIBCMT ref: 10055C2E
                                                        • Part of subcall function 10055B30: __ftol.LIBCMT ref: 10055C41
                                                        • Part of subcall function 100822D1: ExcludeClipRect.GDI32(?,?,?,?,?), ref: 100822F5
                                                        • Part of subcall function 100822D1: ExcludeClipRect.GDI32(?,?,?,?,?), ref: 1008230B
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Rect__ftol$ClientClipExclude$BeginH_prologPaint
                                                      • String ID:
                                                      • API String ID: 3882505602-0
                                                      • Opcode ID: 19eb8dd4212a024db53de0ea1a51e96d69cba311e6466d4ae4097613dbf54172
                                                      • Instruction ID: 699a570d12551f68aac9d25f3edf9ea10a84d509bdd8e820af07708c94a41439
                                                      • Opcode Fuzzy Hash: 19eb8dd4212a024db53de0ea1a51e96d69cba311e6466d4ae4097613dbf54172
                                                      • Instruction Fuzzy Hash: 987172B16087429FC314DF68C984A5BB7E9FBC8740F524A2DF595D3290DB70ED088B92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ReadFile.KERNEL32(000001D0,000001D0,00000000,000001D0,00000000,00000000,00000000,00000000), ref: 1007847B
                                                      • GetLastError.KERNEL32 ref: 10078485
                                                      • ReadFile.KERNEL32(?,?,00000001,000001D0,00000000), ref: 1007854B
                                                      • GetLastError.KERNEL32 ref: 10078555
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileLastRead
                                                      • String ID:
                                                      • API String ID: 1948546556-0
                                                      • Opcode ID: 77f8d5bd77bd300ee73d5c1d4a4f8d19b4191759e482e4da00b37d9025643dba
                                                      • Instruction ID: c6ed1a6be8fefe7ad2bb2433a22754fe620bba91c0de661d2480bd590a99851c
                                                      • Opcode Fuzzy Hash: 77f8d5bd77bd300ee73d5c1d4a4f8d19b4191759e482e4da00b37d9025643dba
                                                      • Instruction Fuzzy Hash: 6A51DF34A847869FDB22CF54C880B8D7BE0FF06344F11C19AE8A18B252D778DA41CB5A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 100826D0: __EH_prolog.LIBCMT ref: 100826D5
                                                        • Part of subcall function 100826D0: BeginPaint.USER32(?,?,?,?,10026739), ref: 100826FE
                                                        • Part of subcall function 10082281: GetClipBox.GDI32(?,?), ref: 10082288
                                                      • IsRectEmpty.USER32(?), ref: 1002AE26
                                                      • PatBlt.GDI32(?,?,?,?,?,00F00021), ref: 1002AEAD
                                                      • GetCurrentObject.GDI32(?,00000006), ref: 1002AF3A
                                                      • GetClientRect.USER32(?,?), ref: 1002AFAC
                                                        • Part of subcall function 10082742: __EH_prolog.LIBCMT ref: 10082747
                                                        • Part of subcall function 10082742: EndPaint.USER32(?,?,?,?,100267B3), ref: 10082764
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: H_prologPaintRect$BeginClientClipCurrentEmptyObject
                                                      • String ID:
                                                      • API String ID: 3717962522-0
                                                      • Opcode ID: e88ed20816b22e1657baac39f9236ce6e3f7f52b1c08827ddfe0c6b04f07b131
                                                      • Instruction ID: 66a2610610aae2c9585438db026ea29a946645fd55025b6b8612084931b6074b
                                                      • Opcode Fuzzy Hash: e88ed20816b22e1657baac39f9236ce6e3f7f52b1c08827ddfe0c6b04f07b131
                                                      • Instruction Fuzzy Hash: 47618975508381AFD324DB64D985F9BB7E8FF99310F404A1EF59A83281DB34E948CB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bd8d73afa21be2d7e65e48d09dcecd8b0fb214c5952fce4139dbe39c4bf59668
                                                      • Instruction ID: 53cb658dcb868fa84e7d3dcbea1a4bd0383e5ab6ef3f302a016503a40ba984fa
                                                      • Opcode Fuzzy Hash: bd8d73afa21be2d7e65e48d09dcecd8b0fb214c5952fce4139dbe39c4bf59668
                                                      • Instruction Fuzzy Hash: 095148B5508741AFC220DF65C88186BFBE8FED5250F108A2EF992C3251D775E909CB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: DeleteObject$Release
                                                      • String ID:
                                                      • API String ID: 2600533906-0
                                                      • Opcode ID: 6829301da1b2c7ee9f1aac25cab57d4aad12c672ed921b7ece623596dcec1a9c
                                                      • Instruction ID: 6048e22b8699ad896a73db4b2aad22ba2e74b85da077b9f2900202a69eee229d
                                                      • Opcode Fuzzy Hash: 6829301da1b2c7ee9f1aac25cab57d4aad12c672ed921b7ece623596dcec1a9c
                                                      • Instruction Fuzzy Hash: AB5181B5A002459FDB44DF28D880B9A7BE5FF48340F08817AED49CF31AEB759949CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsWindow.USER32(?), ref: 10032464
                                                      • GetParent.USER32(?), ref: 100324B4
                                                      • IsWindow.USER32(?), ref: 100324D4
                                                      • SetWindowPos.USER32(?,000000FF,00000000,00000000,00000000,00000000,00000013), ref: 1003254F
                                                        • Part of subcall function 1007FF59: ShowWindow.USER32(?,00000005,1003289E,00000005,00000000,?,?,?,?,?,000003E9,00000000,00000000,?,100CE570), ref: 1007FF67
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Window$ParentShow
                                                      • String ID:
                                                      • API String ID: 2052805569-0
                                                      • Opcode ID: 93dd94f44d94a1b337ab888543deb1bc1d11e54a44b04c8ceaabc3f158737271
                                                      • Instruction ID: f2f1cbb9f007fec87acb16fd72fec5aaa5e5a66b5819febcbdf1c60a7ec61ba8
                                                      • Opcode Fuzzy Hash: 93dd94f44d94a1b337ab888543deb1bc1d11e54a44b04c8ceaabc3f158737271
                                                      • Instruction Fuzzy Hash: 9241AE76604701AFD712CE64DC81BAAB3E8EF84B91F014628FD449F282D774FA05CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 1007FF80: IsWindowEnabled.USER32(?), ref: 1007FF8A
                                                      • IsWindowVisible.USER32(?), ref: 1002467A
                                                        • Part of subcall function 1007DF53: GetWindowTextLengthA.USER32(?), ref: 1007DF60
                                                        • Part of subcall function 1007DF53: GetWindowTextA.USER32(?,00000000,00000000), ref: 1007DF78
                                                        • Part of subcall function 1007A639: SendMessageA.USER32(?,00000466,00000000,00000000), ref: 1007A645
                                                      • wsprintfA.USER32 ref: 10024714
                                                      • SendMessageA.USER32(?,000000B1,00000000,000000FF), ref: 10024740
                                                      • SendMessageA.USER32(?,000000B7,00000000,00000000), ref: 1002474F
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSend$Text$EnabledLengthVisiblewsprintf
                                                      • String ID:
                                                      • API String ID: 1914814478-0
                                                      • Opcode ID: 505dd919bf8d45f88934726acbee14aebf0c638e61635a5008e56d686977db8e
                                                      • Instruction ID: ef3895009e215db7c6d07f0ada199e2d2e9b146e84838c18d39f72978793fa96
                                                      • Opcode Fuzzy Hash: 505dd919bf8d45f88934726acbee14aebf0c638e61635a5008e56d686977db8e
                                                      • Instruction Fuzzy Hash: 795187756087419FD324DF14C981B9BB7F5FB88700F50891EE59A8B780DB74E801CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • WriteFile.KERNEL32(?,?,?,00000000,00000000,00000001,?,?), ref: 100782D8
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: FileWrite
                                                      • String ID:
                                                      • API String ID: 3934441357-0
                                                      • Opcode ID: 405449db713735af82d4be74b5d544e2099625b22b298d7e044c1d5ba0375111
                                                      • Instruction ID: f537c9a7f892cf455ca5bbf96bc340e0e4774ee9c90b146a4feff3a698010b21
                                                      • Opcode Fuzzy Hash: 405449db713735af82d4be74b5d544e2099625b22b298d7e044c1d5ba0375111
                                                      • Instruction Fuzzy Hash: 7951BF31A40648EFCB02CFA8C884A8D7BF0FF45780F21C5A5E9559B2A2D774DB41CB64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsWindow.USER32(?), ref: 1004FD04
                                                      • SendMessageA.USER32(?,000000B1,?,000000FF), ref: 1004FD5D
                                                      • SendMessageA.USER32(?,000000B7,00000000,00000000), ref: 1004FD6C
                                                      • SendMessageA.USER32(?,000000C2,00000000,?), ref: 1004FD9A
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window
                                                      • String ID:
                                                      • API String ID: 2326795674-0
                                                      • Opcode ID: 363530c6a6650c2efa731d08405d192c53a5bb179e86f04c11e35279d40b2b24
                                                      • Instruction ID: 2dbaf51964709cfdf2fcd236062aeaab8fed56e71115d7f6ddc7737cc7d4f800
                                                      • Opcode Fuzzy Hash: 363530c6a6650c2efa731d08405d192c53a5bb179e86f04c11e35279d40b2b24
                                                      • Instruction Fuzzy Hash: 7741D4766487419FE310DF59C884B6BBBE5EB84760F148B2EF995873C1C3749804CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateSolidBrush.GDI32(?), ref: 1005C99A
                                                      • SendMessageA.USER32(?,00000030,00000000,00000000), ref: 1005C9DE
                                                      • SendMessageA.USER32(?,000000B1,?,000000FF), ref: 1005CA14
                                                      • SendMessageA.USER32(?,000000B7,00000000,00000000), ref: 1005CA23
                                                        • Part of subcall function 1007FE87: SetWindowTextA.USER32(?,1003E9DA), ref: 1007FE95
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$BrushCreateSolidTextWindow
                                                      • String ID:
                                                      • API String ID: 3501373727-0
                                                      • Opcode ID: 482980657102185191fed3f0966dc06796aaa0b25d66ecc202d4f9949544e5f3
                                                      • Instruction ID: e061307f59ca1b14522f8fc16228ffeff5d4eecefaa491e5f8954ddd47275906
                                                      • Opcode Fuzzy Hash: 482980657102185191fed3f0966dc06796aaa0b25d66ecc202d4f9949544e5f3
                                                      • Instruction Fuzzy Hash: D43137B46047149FD314CF18C855B2ABBE5FB88B10F008A1DF59587791CB78F804CB55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 100837B3: GetParent.USER32(?), ref: 100837E6
                                                        • Part of subcall function 100837B3: GetLastActivePopup.USER32(?), ref: 100837F5
                                                        • Part of subcall function 100837B3: IsWindowEnabled.USER32(?), ref: 1008380A
                                                        • Part of subcall function 100837B3: EnableWindow.USER32(?,00000000), ref: 1008381D
                                                      • SendMessageA.USER32(?,00000376,00000000,00000000), ref: 10083671
                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,?,00000000), ref: 100836DF
                                                      • MessageBoxA.USER32(00000000,?,?,00000000), ref: 100836ED
                                                      • EnableWindow.USER32(00000000,00000001), ref: 10083709
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Window$EnableMessage$ActiveEnabledFileLastModuleNameParentPopupSend
                                                      • String ID:
                                                      • API String ID: 1958756768-0
                                                      • Opcode ID: a7a5eca6de38d4ac39448e200906648f9f6ac40cb46691bda3582da36f224db9
                                                      • Instruction ID: 04db913457058d27b97713d67daa1820dbbe44e3ea2be97dabde8bc5e0487e4d
                                                      • Opcode Fuzzy Hash: a7a5eca6de38d4ac39448e200906648f9f6ac40cb46691bda3582da36f224db9
                                                      • Instruction Fuzzy Hash: 80216F72E00519BBDB10DE98C8C1A9DB7E5FB84390F21C52AE651E6260E7719D548B50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • lstrcpynA.KERNEL32(1008016E,?,00000104,?,?,?,?,?,?,?,1008015C,?), ref: 1008019C
                                                      • GetFileTime.KERNEL32(00000000,1008015C,?,?,?,?,?,?,?,?,?,1008015C,?), ref: 100801BD
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,1008015C,?), ref: 100801CC
                                                      • GetFileAttributesA.KERNEL32(?,?,?,?,?,?,?,?,1008015C,?), ref: 100801ED
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: File$AttributesSizeTimelstrcpyn
                                                      • String ID:
                                                      • API String ID: 1499663573-0
                                                      • Opcode ID: f1c96ff7c401a00fbb928bb52065c83f859159947251aaff301bd392f35c0f8b
                                                      • Instruction ID: 534bb4fa83478ed58fb0a7d837c611c8722f7b3f701139f733ce955fd6560f17
                                                      • Opcode Fuzzy Hash: f1c96ff7c401a00fbb928bb52065c83f859159947251aaff301bd392f35c0f8b
                                                      • Instruction Fuzzy Hash: 8A316172900605AFD711CF94CC89A9FB7F8FF04350F10892AF596D7590E774A984CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetMessagePos.USER32 ref: 1002E198
                                                      • ScreenToClient.USER32(?,?), ref: 1002E1BA
                                                      • ChildWindowFromPointEx.USER32(?,?,?,00000005), ref: 1002E1D0
                                                      • GetFocus.USER32 ref: 1002E1DB
                                                        • Part of subcall function 1007FFC2: SetFocus.USER32(?,10084191), ref: 1007FFCC
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Focus$ChildClientFromMessagePointScreenWindow
                                                      • String ID:
                                                      • API String ID: 3117237277-0
                                                      • Opcode ID: 7ef830f67bf403ccf2a81d410be53c045097069539a07b557015f32a3964ab45
                                                      • Instruction ID: d8d78c2174d586bd44a047d70d49356a92f706283e445be91fd8f8cbcfcf5c8f
                                                      • Opcode Fuzzy Hash: 7ef830f67bf403ccf2a81d410be53c045097069539a07b557015f32a3964ab45
                                                      • Instruction Fuzzy Hash: B921D235300712ABD215DB24DC41F6AB3A9FF80714F41852DF94987682DB34F912C7A1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetSystemMetrics.USER32(0000002D), ref: 1005DAF9
                                                      • SystemParametersInfoA.USER32 ref: 1005DB53
                                                      • CreateFontIndirectA.GDI32(?), ref: 1005DB61
                                                      • CreatePalette.GDI32(00000300), ref: 1005DBB9
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CreateSystem$FontIndirectInfoMetricsPaletteParameters
                                                      • String ID:
                                                      • API String ID: 934993634-0
                                                      • Opcode ID: 1d37bbc40a325cd20b6b5faeb75ef7afc7229384b77659852a66b99fc30e4393
                                                      • Instruction ID: ac4953ccff171d69267343f0335def9a8a82c409eb37b165b9fed270bb9f70bc
                                                      • Opcode Fuzzy Hash: 1d37bbc40a325cd20b6b5faeb75ef7afc7229384b77659852a66b99fc30e4393
                                                      • Instruction Fuzzy Hash: C9318F74405B80CFE321CF25C888A9BFBF5FF84304F40896EE19A8B691DB75A449CB51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • StartPage.GDI32(?), ref: 1002EA55
                                                      • EndPage.GDI32(?), ref: 1002EA7B
                                                        • Part of subcall function 1003C640: wsprintfA.USER32 ref: 1003C64F
                                                        • Part of subcall function 1007FE87: SetWindowTextA.USER32(?,1003E9DA), ref: 1007FE95
                                                      • UpdateWindow.USER32(?), ref: 1002EACA
                                                      • EndPage.GDI32(?), ref: 1002EAE2
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Page$Window$StartTextUpdatewsprintf
                                                      • String ID:
                                                      • API String ID: 104827578-0
                                                      • Opcode ID: 226295b294ecdea5e34a22323903d797441d61528b141f4b8f19988c15b5fe40
                                                      • Instruction ID: 7da93435303abd188e6fd32dbe9bc6db968925328cf289ca8c62a68ac2a058b6
                                                      • Opcode Fuzzy Hash: 226295b294ecdea5e34a22323903d797441d61528b141f4b8f19988c15b5fe40
                                                      • Instruction Fuzzy Hash: 78217C75602B409BC325DB39DC99A9BB7E8FFC4701F50882DE0AFC6211EB34B8458B51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Parent$RectWindow
                                                      • String ID:
                                                      • API String ID: 2276825053-0
                                                      • Opcode ID: 36758ce066d769009e49a393fa4a5f473b251c989054c83283e8eec67074d94d
                                                      • Instruction ID: 8b599887f60b48d2ada8fad88083d2ffa98d7b06d5a14686dcd6de78cf6a0e4f
                                                      • Opcode Fuzzy Hash: 36758ce066d769009e49a393fa4a5f473b251c989054c83283e8eec67074d94d
                                                      • Instruction Fuzzy Hash: F5116DBA6047069FD714DF64E884D7BB7EDEB84640F40891EB85683201EA75FD058BB4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,?,?), ref: 100779BB
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,?,00000000,00000000), ref: 100779CE
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 10077A1A
                                                      • CompareStringW.KERNEL32(10061746,00000000,00000000,00000000,?,00000000,?,00000000), ref: 10077A32
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$CompareString
                                                      • String ID:
                                                      • API String ID: 376665442-0
                                                      • Opcode ID: 05e8fc9095624c6499e0fc4aa6d95ae5d89a1cf184a9f32caee0188f6e183fbd
                                                      • Instruction ID: bb447c25a6248ed981ea6a87d933c895dc8978a49ba183538b134d1e2565f637
                                                      • Opcode Fuzzy Hash: 05e8fc9095624c6499e0fc4aa6d95ae5d89a1cf184a9f32caee0188f6e183fbd
                                                      • Instruction Fuzzy Hash: 0621383290025AEFDF22CF84CC419DEBFB5FF583A0F118129FA1562160D3369A21DB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageA.USER32(?,00000030,?,00000001), ref: 10022C7D
                                                      • SendMessageA.USER32(?,00000030,?,00000001), ref: 10022C96
                                                      • GetStockObject.GDI32(00000011), ref: 10022CA1
                                                      • SendMessageA.USER32(?,00000030,00000000,00000001), ref: 10022CB4
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$ObjectStock
                                                      • String ID:
                                                      • API String ID: 1309931672-0
                                                      • Opcode ID: 72583e790696ddf8c915712496710c4cdf1b0b4ba3653ec859be4c076dd7854c
                                                      • Instruction ID: 1f2b3b57437fa717bf2dceadab73bda43e50c9f8247efeda31b677370a9a655d
                                                      • Opcode Fuzzy Hash: 72583e790696ddf8c915712496710c4cdf1b0b4ba3653ec859be4c076dd7854c
                                                      • Instruction Fuzzy Hash: A1119A36700621BBD615CF94E894F9B77A9FF88B51F11880DF6059B280CB70EC42CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetTopWindow.USER32(?), ref: 1003094D
                                                        • Part of subcall function 10030780: IsChild.USER32(?,?), ref: 100307FD
                                                        • Part of subcall function 10030780: GetParent.USER32(?), ref: 10030817
                                                      • SendMessageA.USER32(00000000,000000F0,00000000,00000000), ref: 100309A6
                                                      • SendMessageA.USER32(00000000,000000F1,00000000,00000000), ref: 100309B6
                                                      • GetWindow.USER32(00000000,00000002), ref: 100309BB
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MessageSendWindow$ChildParent
                                                      • String ID:
                                                      • API String ID: 1043810220-0
                                                      • Opcode ID: 37bb3ddefa57b3a940994c78c888af5d046b6224b15d2a0586954de7fe02bfe1
                                                      • Instruction ID: 86834589c3ad55a0ed17668f90627cecaeb169a2f183fa5e4b1106809987f95a
                                                      • Opcode Fuzzy Hash: 37bb3ddefa57b3a940994c78c888af5d046b6224b15d2a0586954de7fe02bfe1
                                                      • Instruction Fuzzy Hash: DA0175317827127BF263D6659CA2F6B728CDF45BA2F110256FB00EE1D2DE50FC4081A9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetParent.USER32(?), ref: 10054E4B
                                                      • SendMessageA.USER32(?,000083EB,?,00000000), ref: 10054E75
                                                      • SendMessageA.USER32(?,000083EC,?,00000000), ref: 10054E89
                                                      • SendMessageA.USER32(?,000083E9,?,00000000), ref: 10054EAC
                                                        • Part of subcall function 1007FEAE: GetDlgCtrlID.USER32(?), ref: 1007FEB8
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CtrlParent
                                                      • String ID:
                                                      • API String ID: 1383977212-0
                                                      • Opcode ID: f49d5004b71402a401a572b91f373aae9eabbb1ced449deecdb4f2e107807517
                                                      • Instruction ID: 4eb29a756dc411fa6cfba5e92dcedc0bf7b01d5cfa33e066d66f05a9afca892f
                                                      • Opcode Fuzzy Hash: f49d5004b71402a401a572b91f373aae9eabbb1ced449deecdb4f2e107807517
                                                      • Instruction Fuzzy Hash: DD01A276300A147BD711E7AA8CD6D3FB3ADFBC4A81B418109F14187281CE69FD0647A5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000002), ref: 1007C26E
                                                      • GetCurrentProcess.KERNEL32(?,00000000), ref: 1007C274
                                                      • DuplicateHandle.KERNEL32(00000000), ref: 1007C277
                                                      • GetLastError.KERNEL32(00000000), ref: 1007C291
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CurrentProcess$DuplicateErrorHandleLast
                                                      • String ID:
                                                      • API String ID: 3907606552-0
                                                      • Opcode ID: a5101d3144307ba7861dc2654ded499bc7f69f95feace2ef4791e884fea9894d
                                                      • Instruction ID: ab3adffb5aed7dac38bfcec2e00c2cc9d5ddf210246e40ae2a5c6d9c988c06c3
                                                      • Opcode Fuzzy Hash: a5101d3144307ba7861dc2654ded499bc7f69f95feace2ef4791e884fea9894d
                                                      • Instruction Fuzzy Hash: 130175757002046BE700DBA98C49F5A77DDEF84750F108115FA55DB292DAA4EC018764
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • WindowFromPoint.USER32(?,?), ref: 1007AB35
                                                      • GetParent.USER32(00000000), ref: 1007AB42
                                                      • ScreenToClient.USER32(00000000,?), ref: 1007AB63
                                                      • IsWindowEnabled.USER32(00000000), ref: 1007AB7C
                                                        • Part of subcall function 1008305D: GetWindowLongA.USER32(00000000,000000F0), ref: 1008306E
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Window$ClientEnabledFromLongParentPointScreen
                                                      • String ID:
                                                      • API String ID: 2204725058-0
                                                      • Opcode ID: 5466cf74351079e85ff5a3cae953425a6d405cb254c9982349ca230569cf0ee2
                                                      • Instruction ID: 59b67303d93348497fe12917058dedb8ffeeb126b93a1ffd83cffd9f71585c2d
                                                      • Opcode Fuzzy Hash: 5466cf74351079e85ff5a3cae953425a6d405cb254c9982349ca230569cf0ee2
                                                      • Instruction Fuzzy Hash: 2B01B136A00914AB97028BD88C45C6E7BEEFFCA690B01811AF945D3222DB39CD048BA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetDlgItem.USER32(?,?), ref: 1007EBFD
                                                      • GetTopWindow.USER32(00000000), ref: 1007EC10
                                                      • GetTopWindow.USER32(?), ref: 1007EC40
                                                      • GetWindow.USER32(00000000,00000002), ref: 1007EC5B
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Window$Item
                                                      • String ID:
                                                      • API String ID: 369458955-0
                                                      • Opcode ID: d4d7c362389a79e6e9a17368a7765c7e6495c528dc877133bc7ca75944367426
                                                      • Instruction ID: 2729d6b74eefd294aba0cdda328cafe2ad6a5ab7ab740e0261ff9e40dd5ec2fb
                                                      • Opcode Fuzzy Hash: d4d7c362389a79e6e9a17368a7765c7e6495c528dc877133bc7ca75944367426
                                                      • Instruction Fuzzy Hash: E801A73A5036AA67DB239F658C44E8F3AA8EF4D3D0F01C411FE8191010E739DD1296A9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetTopWindow.USER32(?), ref: 1007EC79
                                                      • SendMessageA.USER32(00000000,?,?,?), ref: 1007ECAF
                                                      • GetTopWindow.USER32(00000000), ref: 1007ECBC
                                                      • GetWindow.USER32(00000000,00000002), ref: 1007ECDA
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSend
                                                      • String ID:
                                                      • API String ID: 1496643700-0
                                                      • Opcode ID: 405357a37fc5a405dafe2a3fceb8d043e41a2c76e5b5df406dd1f6d44cdbcb74
                                                      • Instruction ID: be4eeb1e5889ab0f6eeb9912aff910abb32efb4a5aace9c1319c35365a70e3d2
                                                      • Opcode Fuzzy Hash: 405357a37fc5a405dafe2a3fceb8d043e41a2c76e5b5df406dd1f6d44cdbcb74
                                                      • Instruction Fuzzy Hash: 99010C3A40265ABBDF039F918D05E9F3B6AEF09390F008015FE4161061D73ACD62EBA9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Item$EnableFocusMenuNextParent
                                                      • String ID:
                                                      • API String ID: 988757621-0
                                                      • Opcode ID: 8eca7eb31576c69d2645f18808e37e4e13094b10b863cfd2a707424a9f9eae71
                                                      • Instruction ID: 3a792526b509070f1ec1498879176e4272700e1da7fb8f8cc60ca39d83bf2228
                                                      • Opcode Fuzzy Hash: 8eca7eb31576c69d2645f18808e37e4e13094b10b863cfd2a707424a9f9eae71
                                                      • Instruction Fuzzy Hash: 8F113935A04A019FEB69DF60D859B2AB7F5FF40750F118A2EF142865A0CB74F841CB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RegSetValueExA.ADVAPI32(00000000,?,00000000,00000004,?,00000004,?,?), ref: 10083A0B
                                                      • RegCloseKey.ADVAPI32(00000000,?,?), ref: 10083A14
                                                      • wsprintfA.USER32 ref: 10083A30
                                                      • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 10083A49
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ClosePrivateProfileStringValueWritewsprintf
                                                      • String ID:
                                                      • API String ID: 1902064621-0
                                                      • Opcode ID: 566330674589edb3b6ada894f392f68012fc4393117fbf5c0e486930c6f6fcd9
                                                      • Instruction ID: f795c75bd2d4a3e1559c2858ae442f6c2d2f8697e5ddf2cab85ace26d18373cf
                                                      • Opcode Fuzzy Hash: 566330674589edb3b6ada894f392f68012fc4393117fbf5c0e486930c6f6fcd9
                                                      • Instruction Fuzzy Hash: 3E01D132800A29BBDB129F64CC04FEF3BB8FF48A50F048426FA11A6064D770D921CB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetObjectA.GDI32(00000000,0000000C,?), ref: 1007F398
                                                      • SetBkColor.GDI32(00000000,00000000), ref: 1007F3A4
                                                      • GetSysColor.USER32(00000008), ref: 1007F3B4
                                                      • SetTextColor.GDI32(00000000,?), ref: 1007F3BE
                                                        • Part of subcall function 1008305D: GetWindowLongA.USER32(00000000,000000F0), ref: 1008306E
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Color$LongObjectTextWindow
                                                      • String ID:
                                                      • API String ID: 2871169696-0
                                                      • Opcode ID: c135494b4e656b3c8369383232dd38872f3c8cd877f110337274e9480d372cbb
                                                      • Instruction ID: e21251b5a71e6770a3c95d52e5095503a60e29fd8ce83ea14b61ad19c87a3658
                                                      • Opcode Fuzzy Hash: c135494b4e656b3c8369383232dd38872f3c8cd877f110337274e9480d372cbb
                                                      • Instruction Fuzzy Hash: 48014F31900609ABEF029F64CC55BBE3FA5FB01380F11951AFD52E40F4D774CA90CA65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: wsprintf
                                                      • String ID: %d.%d$gfff
                                                      • API String ID: 2111968516-3773932281
                                                      • Opcode ID: c1a5db5b6f317572c9ce0ddad54081f7461be07844ff7423160c0fd0d018c41e
                                                      • Instruction ID: ddcf63eda2621f6d783403b5e8e3edf59964f4bc66880023a0f884653e2969c0
                                                      • Opcode Fuzzy Hash: c1a5db5b6f317572c9ce0ddad54081f7461be07844ff7423160c0fd0d018c41e
                                                      • Instruction Fuzzy Hash: D6F059B1B0025117C74CD91EAC18E1B2A9AFBDA310F09843AF448DB354D920DC518366
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetWindowExtEx.GDI32(?,?), ref: 100824A7
                                                      • GetViewportExtEx.GDI32(?,?), ref: 100824B4
                                                      • MulDiv.KERNEL32(?,00000000,00000000), ref: 100824D9
                                                      • MulDiv.KERNEL32(?,00000000,00000000), ref: 100824F4
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ViewportWindow
                                                      • String ID:
                                                      • API String ID: 1589084482-0
                                                      • Opcode ID: f2e5044f3bb5aabcc57f6ee3ad9e15a2252004ff92fa2da1a6259441d222f612
                                                      • Instruction ID: 22693d20f8ea9b4516b878040ea84e2c382347031992ba2bd7d0f9c029de246d
                                                      • Opcode Fuzzy Hash: f2e5044f3bb5aabcc57f6ee3ad9e15a2252004ff92fa2da1a6259441d222f612
                                                      • Instruction Fuzzy Hash: D7F01976800219BFEF11AF60EC4ACAEBBBEFF80310710442AF851A2170EB717D519B50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetWindowExtEx.GDI32(?,?), ref: 10082510
                                                      • GetViewportExtEx.GDI32(?,?), ref: 1008251D
                                                      • MulDiv.KERNEL32(?,00000000,00000000), ref: 10082542
                                                      • MulDiv.KERNEL32(?,00000000,00000000), ref: 1008255D
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ViewportWindow
                                                      • String ID:
                                                      • API String ID: 1589084482-0
                                                      • Opcode ID: 2e0dc13639ffbf42b386b8837f0723a64db6fa119133456d350dead9c2463ddf
                                                      • Instruction ID: 89d052cc0ae90a42cb3169c517f0027183921b96892c8d62090cce3de445b2db
                                                      • Opcode Fuzzy Hash: 2e0dc13639ffbf42b386b8837f0723a64db6fa119133456d350dead9c2463ddf
                                                      • Instruction Fuzzy Hash: 83F01976800219BFEF11AF60EC4ACAEBBBEFF80310710442AF851A2170EB717D519B50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetClientRect.USER32(?), ref: 100547EF
                                                      • PtInRect.USER32(?,?,?), ref: 10054804
                                                        • Part of subcall function 1007FF80: IsWindowEnabled.USER32(?), ref: 1007FF8A
                                                        • Part of subcall function 10054C20: UpdateWindow.USER32(00000002), ref: 10054C3D
                                                      • GetCapture.USER32 ref: 1005482C
                                                      • SetCapture.USER32(00000002), ref: 10054837
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CaptureRectWindow$ClientEnabledUpdate
                                                      • String ID:
                                                      • API String ID: 2789096292-0
                                                      • Opcode ID: f3c436e387918e41812696a0252b5905e991da57bfbc35daff5733d023dd6948
                                                      • Instruction ID: d3baca12bd846d842ad753329bba61ada4d2d40f701d9602d47ffd8f31392e96
                                                      • Opcode Fuzzy Hash: f3c436e387918e41812696a0252b5905e991da57bfbc35daff5733d023dd6948
                                                      • Instruction Fuzzy Hash: 5BF0C235B00A226FD711EB64CC84AAF37E8FF44248B01491EF582C3140EF74EA048B91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RegOpenKeyExA.ADVAPI32(?,?,00000000,00000001,00000000,00000000), ref: 1002ABBA
                                                      • RegQueryValueA.ADVAPI32 ref: 1002ABDE
                                                      • lstrcpyA.KERNEL32(?,00000000), ref: 1002ABF1
                                                      • RegCloseKey.ADVAPI32(?), ref: 1002ABFC
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValuelstrcpy
                                                      • String ID:
                                                      • API String ID: 534897748-0
                                                      • Opcode ID: 1347bb6518ed9ed1d09e7e70552a2c8fcd1841830c644513c60789ec6c69ab4f
                                                      • Instruction ID: b97ead228132860aa3ea9e7c40903b2df690590f54ab336b277af2d0a96fa850
                                                      • Opcode Fuzzy Hash: 1347bb6518ed9ed1d09e7e70552a2c8fcd1841830c644513c60789ec6c69ab4f
                                                      • Instruction Fuzzy Hash: 54F04F75504716BFE310DB10CC89FABBBA8FB84750F008A0DF98882250E670DC45CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • lstrlenA.KERNEL32(?), ref: 10083154
                                                      • GetWindowTextA.USER32(?,?,00000100), ref: 10083170
                                                      • lstrcmpA.KERNEL32(?,?), ref: 10083184
                                                      • SetWindowTextA.USER32(?,?), ref: 10083194
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: TextWindow$lstrcmplstrlen
                                                      • String ID:
                                                      • API String ID: 330964273-0
                                                      • Opcode ID: 29b93318854129676d19bc346d097b19797b5fd021c76b3f9c9a138ddc91fa62
                                                      • Instruction ID: 4091780938b634bacc79a50171e6c02e1dc85488df7356468cef93073cda34e3
                                                      • Opcode Fuzzy Hash: 29b93318854129676d19bc346d097b19797b5fd021c76b3f9c9a138ddc91fa62
                                                      • Instruction Fuzzy Hash: F3F0F83190012DBBDF12AF25CC48ADE7BADFB087A0F008122F849D5131D770CA959B94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: <
                                                      • API String ID: 0-4251816714
                                                      • Opcode ID: db84b4321c5dfd81d1dce77c6c79be486a83e1c9ed57232982ee30c0ddf1de1e
                                                      • Instruction ID: b7eb08cfaa276de6721ae108bc04c3794cb4591316a21a4fdd9e555a074719a2
                                                      • Opcode Fuzzy Hash: db84b4321c5dfd81d1dce77c6c79be486a83e1c9ed57232982ee30c0ddf1de1e
                                                      • Instruction Fuzzy Hash: 77B19475908741CFD725CF24C880A5FB7E1FBC5252F548A2DF99A9B2A0DB31D944CB82
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __startOneArgErrorHandling.LIBCMT ref: 1006B8D2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: ErrorHandling__start
                                                      • String ID: pow
                                                      • API String ID: 3213639722-2276729525
                                                      • Opcode ID: 1d479e1d4aebe3bdca9764ef48a735e561d351221499fb3ab83c91ac1570e10a
                                                      • Instruction ID: 9fa8535d8bcc3affc70836e3a78e5dc7c2fea9c45819e645d29ab838674a2349
                                                      • Opcode Fuzzy Hash: 1d479e1d4aebe3bdca9764ef48a735e561d351221499fb3ab83c91ac1570e10a
                                                      • Instruction Fuzzy Hash: 4E5129A9A1864AE6E701E724C94135E2BD9DB40790F20CA59F5C5832A6EF38CCD4D74B
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 10034A60: GetCurrentThreadId.KERNEL32 ref: 10034A83
                                                        • Part of subcall function 10034A60: IsWindow.USER32(000103DE), ref: 10034A9F
                                                        • Part of subcall function 10034A60: SendMessageA.USER32(000103DE,000083E7,?,00000000), ref: 10034AB8
                                                        • Part of subcall function 10034A60: ExitProcess.KERNEL32 ref: 10034ACD
                                                      • DeleteCriticalSection.KERNEL32(100CF000,?,?,?,?,?,?,?,?,1003BEDD), ref: 1003126A
                                                        • Part of subcall function 1007DC17: __EH_prolog.LIBCMT ref: 1007DC1C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CriticalCurrentDeleteExitH_prologMessageProcessSectionSendThreadWindow
                                                      • String ID: !$#
                                                      • API String ID: 2888814780-2504090897
                                                      • Opcode ID: 4341d90058751e6c057ad4fe820e3d7e988664ac4d945ecf1b3d619dd99c670c
                                                      • Instruction ID: 3b49719241630d5754973166d90b3589330d499462f647ab24a7a047d8a1cbc0
                                                      • Opcode Fuzzy Hash: 4341d90058751e6c057ad4fe820e3d7e988664ac4d945ecf1b3d619dd99c670c
                                                      • Instruction Fuzzy Hash: 37913A38118781CED712CFB4D4847CABFE4EFA5344F59484DE4DA47292DBB96248C7A2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: Info
                                                      • String ID: $
                                                      • API String ID: 1807457897-3032137957
                                                      • Opcode ID: a4c5353a2de17349e5bf21cbdb9caf6636ec0554377138c7b92b63caff50a201
                                                      • Instruction ID: 2e049286fb51f628b48f63225c6e63b71bbefeca7b08655e5122e9e9bb27600a
                                                      • Opcode Fuzzy Hash: a4c5353a2de17349e5bf21cbdb9caf6636ec0554377138c7b92b63caff50a201
                                                      • Instruction Fuzzy Hash: 20418C319042A86EEB16CA14DC85BFB7FAAEF05780F5000F9DA86DB153CA754944C771
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID: 0-3916222277
                                                      • Opcode ID: a9304a84c7f41c6907c03c958ed5da5c9a7b20e79673a44b43445a536b08e0ca
                                                      • Instruction ID: 0f982e1c6247a3fb638ea1ac4e7c896f1af576601b3a73f9f2ba43a5ccf740bf
                                                      • Opcode Fuzzy Hash: a9304a84c7f41c6907c03c958ed5da5c9a7b20e79673a44b43445a536b08e0ca
                                                      • Instruction Fuzzy Hash: 65316975108381EFC314CB14D840B5BB7E4FB99664F504A3DF89A83290E738A9058B56
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 10086272: LeaveCriticalSection.KERNEL32(000000FF,100857D5,00000010,00000010,?,?,?,?,?,10085137,1008519A,10084A20,1008513D,100813C9,1006A835), ref: 1008628A
                                                        • Part of subcall function 1006E04C: RaiseException.KERNEL32(?,?,?,00000003,00000000,00000000), ref: 1006E07A
                                                      • wsprintfA.USER32 ref: 1007E1FF
                                                      • wsprintfA.USER32 ref: 1007E21B
                                                      • GetClassInfoA.USER32(?,-00000058,?), ref: 1007E22A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: wsprintf$ClassCriticalExceptionInfoLeaveRaiseSection
                                                      • String ID: Afx:%x:%x
                                                      • API String ID: 2529146597-2071556601
                                                      • Opcode ID: a836ec017e3a77df364a4bc11db7516f00865333c7277dcf137215cd3c138ab9
                                                      • Instruction ID: ecfb5547a3f1d19632d45726a4159b79be3249f00ed62ac5c25f8ad9ad1f7776
                                                      • Opcode Fuzzy Hash: a836ec017e3a77df364a4bc11db7516f00865333c7277dcf137215cd3c138ab9
                                                      • Instruction Fuzzy Hash: B0112CB4D0125AAFDB00DFA588859DEBBF8FF09354F01402AFA54E3212E7749E41CBA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: wsprintf
                                                      • String ID:
                                                      • API String ID: 2111968516-0
                                                      • Opcode ID: b84cb7522d2a186defaf1a61835def356d6824a394c462b962a6fc2ca03e0f05
                                                      • Instruction ID: 03c2f353ba283ab6bef31b419d50fb5483ca2a01ebb32a4c503c5bd75033368e
                                                      • Opcode Fuzzy Hash: b84cb7522d2a186defaf1a61835def356d6824a394c462b962a6fc2ca03e0f05
                                                      • Instruction Fuzzy Hash: 9931B2B94043045FC314DB65DC859ABBBE9FFC5255F000A2DF94693291EB71EA08C762
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(100D0D50,?,100D0D34,100D0D50,100D0D34,?,100856C8,02ECEAC0,00000000,00000000,?,?,1006A844,?,000000FF), ref: 10085646
                                                      • LeaveCriticalSection.KERNEL32(100D0D50,?,?,100856C8,02ECEAC0,00000000,00000000,?,?,1006A844,?,000000FF,?,1006B749,?,?), ref: 10085656
                                                      • LocalFree.KERNEL32(00000003,?,100856C8,02ECEAC0,00000000,00000000,?,?,1006A844,?,000000FF,?,1006B749,?,?,?), ref: 1008565F
                                                      • TlsSetValue.KERNEL32(100D0D34,00000000,?,100856C8,02ECEAC0,00000000,00000000,?,?,1006A844,?,000000FF,?,1006B749,?,?), ref: 10085675
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterFreeLeaveLocalValue
                                                      • String ID:
                                                      • API String ID: 2949335588-0
                                                      • Opcode ID: 1805557714b6aeb2075f39f382f43857598cf786cc429017c0f09f91896d6001
                                                      • Instruction ID: bb7479c90189d7cd5dcaf1cfc0049cdb77822dfe4bcddfaa602cdfebf3760fcb
                                                      • Opcode Fuzzy Hash: 1805557714b6aeb2075f39f382f43857598cf786cc429017c0f09f91896d6001
                                                      • Instruction Fuzzy Hash: 73218B31A00611EFDB11DF44C885BAAB7F5FF49792F90806AE9428B2A5D772FC60CB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,10073D22,?,?,?,1006D023,?,?,?,?,?,?), ref: 10073F82
                                                      • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,10073D22,?,?,?,1006D023,?,?,?,?,?,?), ref: 10073FB6
                                                      • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 10073FD0
                                                      • HeapFree.KERNEL32(00000000,?), ref: 10073FE7
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: AllocHeap$FreeVirtual
                                                      • String ID:
                                                      • API String ID: 3499195154-0
                                                      • Opcode ID: 78fafb618e08c96dd9c32a0136725dbab79bc809acd339bb350fb48173a8ed42
                                                      • Instruction ID: f26ea5149778567151fdae40d819a9780b912bff94b0965ed4b7deb1e405d073
                                                      • Opcode Fuzzy Hash: 78fafb618e08c96dd9c32a0136725dbab79bc809acd339bb350fb48173a8ed42
                                                      • Instruction Fuzzy Hash: 4A115B31600722AFF7218F18CCC5E967BF6FB46794B11452AF991C71B1CB31A805CB60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(100D0E28,?,00000000,?,?,100857BE,00000010,?,?,?,?,?,10085137,1008519A,10084A20,1008513D), ref: 1008623D
                                                      • InitializeCriticalSection.KERNEL32(00000000,?,00000000,?,?,100857BE,00000010,?,?,?,?,?,10085137,1008519A,10084A20,1008513D), ref: 1008624F
                                                      • LeaveCriticalSection.KERNEL32(100D0E28,?,00000000,?,?,100857BE,00000010,?,?,?,?,?,10085137,1008519A,10084A20,1008513D), ref: 10086258
                                                      • EnterCriticalSection.KERNEL32(00000000,00000000,?,?,100857BE,00000010,?,?,?,?,?,10085137,1008519A,10084A20,1008513D,100813C9), ref: 1008626A
                                                        • Part of subcall function 1008616F: GetVersion.KERNEL32(?,10086212,?,100857BE,00000010,?,?,?,?,?,10085137,1008519A,10084A20,1008513D,100813C9,1006A835), ref: 10086182
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$Enter$InitializeLeaveVersion
                                                      • String ID:
                                                      • API String ID: 1193629340-0
                                                      • Opcode ID: 3004b0736d2d9c43024200d273e41274061eab5cd0c1e6270f73fa3e1e5de829
                                                      • Instruction ID: 0e8cf1bb6903f1723a66a5d6fce3ae071eb615c21debabdb54c12e1b0408141b
                                                      • Opcode Fuzzy Hash: 3004b0736d2d9c43024200d273e41274061eab5cd0c1e6270f73fa3e1e5de829
                                                      • Instruction Fuzzy Hash: 53F0193180166B9FD710DF94DCC8A4AB3AEFB59296B01043BFE4992021D730B455CBA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • InitializeCriticalSection.KERNEL32(?,1006F4B2,?,1006B677), ref: 10072548
                                                      • InitializeCriticalSection.KERNEL32 ref: 10072550
                                                      • InitializeCriticalSection.KERNEL32 ref: 10072558
                                                      • InitializeCriticalSection.KERNEL32 ref: 10072560
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.1682710474.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                      • Associated: 00000006.00000002.1682647438.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682834239.000000001008B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682928865.00000000100B4000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682956960.00000000100B6000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682977441.00000000100B8000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1682998654.00000000100BE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683018565.00000000100C1000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683039440.00000000100C2000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683062306.00000000100CE000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683082099.00000000100D3000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                      • Associated: 00000006.00000002.1683101011.00000000100D7000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                      Similarity
                                                      • API ID: CriticalInitializeSection
                                                      • String ID:
                                                      • API String ID: 32694325-0
                                                      • Opcode ID: 64b20aacee8ba5d15a0e0698260ea6305084fc3467a0ea4ca1bb4f2ca8b4fa2e
                                                      • Instruction ID: 24b74729c6c22523d68ad1e101d94a62da8fcc49e01a20f4911fd9e6a67b9de8
                                                      • Opcode Fuzzy Hash: 64b20aacee8ba5d15a0e0698260ea6305084fc3467a0ea4ca1bb4f2ca8b4fa2e
                                                      • Instruction Fuzzy Hash: 9FC002398059349EEA322F55DD85CD93F25EB05260301026BE20453030CA232C20DFD0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%