Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
neo.msi

Overview

General Information

Sample name:neo.msi
Analysis ID:1432285
MD5:37605a3eb80f3366e56938031a9ac917
SHA1:0582a0dd69d6027fb94765254ed91ad736ade305
SHA256:4e7ac0bdb516e983b3cab7f79850d8102d2bf4117bb343b68d0da73780cceb1a
Infos:

Detection

Latrodectus
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
System process connects to network (likely due to code injection or exploit)
Yara detected Latrodectus
C2 URLs / IPs found in malware configuration
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject threads in other processes
Drops executables to the windows directory (C:\Windows) and starts them
Rundll32 performs DNS lookup (likely malicious behavior)
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks for available system drives (often done to infect USB drives)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Modifies existing windows services
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w7x64
  • msiexec.exe (PID: 1072 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\neo.msi" MD5: AC2E7152124CEED36846BD1B6592A00F)
  • msiexec.exe (PID: 152 cmdline: C:\Windows\system32\msiexec.exe /V MD5: AC2E7152124CEED36846BD1B6592A00F)
    • msiexec.exe (PID: 2864 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 274E0059499F24D0FC6E34D9DC99A829 C MD5: 4315D6ECAE85024A0567DF2CB253B7B0)
    • msiexec.exe (PID: 3348 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 5FD089C2C199466E3D17DC881ED4AD10 MD5: 4315D6ECAE85024A0567DF2CB253B7B0)
    • MSI1B42.tmp (PID: 3540 cmdline: "C:\Windows\Installer\MSI1B42.tmp" C:/Windows/System32/rundll32.exe C:\Users\user\AppData\Local\sharepoint\360total.dll, homq MD5: B9545ED17695A32FACE8C3408A6A3553)
  • rundll32.exe (PID: 3572 cmdline: "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Local\sharepoint\360total.dll, homq MD5: DD81D91FF3B0763C392422865C9AC12E)
    • rundll32.exe (PID: 3580 cmdline: rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_6a61d649.dll", homq MD5: DD81D91FF3B0763C392422865C9AC12E)
  • taskeng.exe (PID: 3620 cmdline: taskeng.exe {9EB3A60F-302F-4AB2-B149-897715BB8B05} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1] MD5: 65EA57712340C09B1B0C427B4848AE05)
    • rundll32.exe (PID: 3700 cmdline: rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_6a61d649.dll", homq MD5: DD81D91FF3B0763C392422865C9AC12E)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Unidentified 111 (Latrodectus), LatrodectusFirst discovered in October 2023, BLACKWIDOW is a backdoor written in C that communicates over HTTP using RC4 encrypted requests. The malware has the capability to execute discovery commands, query information about the victim's machine, update itself, as well as download and execute an EXE, DLL, or shellcode. The malware is believed to have been developed by LUNAR SPIDER, the creators of IcedID (aka BokBot) Malware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.unidentified_111
{"C2 url": ["https://jarinamaers.shop/live/", "https://startmast.shop/live/"]}
SourceRuleDescriptionAuthorStrings
00000009.00000003.614395824.0000000000470000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
    00000008.00000002.446771476.00000000000A0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
      00000009.00000002.619163772.0000000001E80000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
        0000000D.00000002.420736655.00000000002A0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
          00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            13.2.rundll32.exe.2a0000.0.unpackJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
              8.2.rundll32.exe.a0000.0.unpackJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
                13.2.rundll32.exe.2a0000.0.raw.unpackJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
                  9.2.rundll32.exe.110000.0.raw.unpackJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
                    8.2.rundll32.exe.130000.1.raw.unpackJoeSecurity_LatrodectusYara detected LatrodectusJoe Security
                      Click to see the 7 entries

                      System Summary

                      barindex
                      Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Windows\System32\rundll32.exe, ProcessId: 3580, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 8.2.rundll32.exe.130000.1.unpackMalware Configuration Extractor: Latrodectus {"C2 url": ["https://jarinamaers.shop/live/", "https://startmast.shop/live/"]}
                      Source: :wtfbbq (copy)Virustotal: Detection: 9%Perma Link
                      Source: C:\Users\user\AppData\Local\sharepoint\360total.dllVirustotal: Detection: 9%Perma Link
                      Source: C:\Users\user\AppData\Roaming\Custom_update\Update_6a61d649.dllVirustotal: Detection: 9%Perma Link
                      Source: 13.2.rundll32.exe.1ad0000.1.raw.unpackString decryptor:
                      Source: 13.2.rundll32.exe.1ad0000.1.raw.unpackString decryptor: "
                      Source: 13.2.rundll32.exe.1ad0000.1.raw.unpackString decryptor: uau3"#%,''!
                      Source: 13.2.rundll32.exe.1ad0000.1.raw.unpackString decryptor: FfD!6""#'& )<
                      Source: 13.2.rundll32.exe.1ad0000.1.raw.unpackString decryptor: jB!
                      Source: 13.2.rundll32.exe.1ad0000.1.raw.unpackString decryptor:
                      Source: 13.2.rundll32.exe.1ad0000.1.raw.unpackString decryptor: 3efal9#"
                      Source: 13.2.rundll32.exe.1ad0000.1.raw.unpackString decryptor: #kl&+=>4>@F[yz1
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018003BC0C CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptGenRandom,CryptReleaseContext,8_2_000000018003BC0C
                      Source: Binary string: C:\JobRelease\win\Release\custact\x86\viewer.pdb: source: MSI1B42.tmp, 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmp, MSI1B42.tmp, 00000007.00000000.402335120.0000000000D57000.00000002.00000001.01000000.00000005.sdmp, neo.msi, 747f6e.msi.1.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr
                      Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdb source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.dr
                      Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdbn source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.dr
                      Source: Binary string: C:\JobRelease\win\Release\custact\x86\viewer.pdb source: MSI1B42.tmp, 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmp, MSI1B42.tmp, 00000007.00000000.402335120.0000000000D57000.00000002.00000001.01000000.00000005.sdmp, neo.msi, 747f6e.msi.1.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr
                      Source: Binary string: C:\vmagent_new\bin\joblist\574019\out\Release\360Util64.pdb source: rundll32.exe, 00000008.00000003.405624482.0000000001FC0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmp, rundll32.exe, 00000009.00000002.619259049.0000000180086000.00000002.00000001.01000000.00000009.sdmp, Update_6a61d649.dll.8.dr, 360total.dll.1.dr
                      Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeFile opened: c:Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_CLASSES\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\TreatAsJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\TreatAsJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\ProgidJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\ProgidJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\ProgIDJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\ProgidJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\ProgidJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\ProgIDJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\InprocServer32Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\InprocServer32Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\InprocServer32Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\InprocHandler32Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\InprocHandler32Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\InprocHandlerJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\InprocHandlerJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_CLASSES\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_CURRENT_USER_Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\TreatAsJump to behavior
                      Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}\TreatAsJump to behavior
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D4AF79 FindFirstFileExW,7_2_00D4AF79
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0013A350 FindFirstFileW,FindNextFileW,LoadLibraryW,LoadLibraryExW,8_2_0013A350
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00131A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose,8_2_00131A08
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00140DD8 FindFirstFileA,8_2_00140DD8
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00140DE0 FindFirstFileW,8_2_00140DE0
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001CA350 FindFirstFileW,FindNextFileW,LoadLibraryW,LoadLibraryExW,9_2_001CA350
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001C1A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose,9_2_001C1A08
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01ADA350 FindFirstFileW,FindNextFileW,LoadLibraryW,LoadLibraryExW,13_2_01ADA350
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AE0DE0 FindFirstFileW,13_2_01AE0DE0
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AE0DD8 FindFirstFileA,13_2_01AE0DD8
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AD1A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose,13_2_01AD1A08

                      Networking

                      barindex
                      Source: C:\Windows\System32\rundll32.exeDomain query: jarinamaers.shop
                      Source: Malware configuration extractorURLs: https://jarinamaers.shop/live/
                      Source: Malware configuration extractorURLs: https://startmast.shop/live/
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00134F58 InternetReadFile,8_2_00134F58
                      Source: global trafficDNS traffic detected: DNS query: jarinamaers.shop
                      Source: rundll32.exe, 00000008.00000003.405624482.0000000001FC0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmp, rundll32.exe, 00000009.00000002.619259049.0000000180086000.00000002.00000001.01000000.00000009.sdmp, Update_6a61d649.dll.8.dr, 360total.dll.1.drString found in binary or memory: ftp://ftp%2desktop.ini
                      Source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                      Source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                      Source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                      Source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                      Source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                      Source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                      Source: rundll32.exeString found in binary or memory: http://dr.f.360.cn/scan
                      Source: rundll32.exe, 00000008.00000003.405624482.0000000001FC0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmp, rundll32.exe, 00000009.00000002.619259049.0000000180086000.00000002.00000001.01000000.00000009.sdmp, Update_6a61d649.dll.8.dr, 360total.dll.1.drString found in binary or memory: http://dr.f.360.cn/scanlist
                      Source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drString found in binary or memory: http://ocsp.digicert.com0C
                      Source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drString found in binary or memory: http://ocsp.digicert.com0O
                      Source: rundll32.exeString found in binary or memory: http://pconf.f.360.cn/safe_update.php
                      Source: rundll32.exeString found in binary or memory: http://pscan.f.360.cn/safe_update.php
                      Source: rundll32.exe, 00000008.00000003.405624482.0000000001FC0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmp, rundll32.exe, 00000009.00000002.619259049.0000000180086000.00000002.00000001.01000000.00000009.sdmp, Update_6a61d649.dll.8.dr, 360total.dll.1.drString found in binary or memory: http://pscan.f.360.cn/safe_update.phphttp://pconf.f.360.cn/safe_update.phphttp://sconf.f.360.cn/clie
                      Source: rundll32.exeString found in binary or memory: http://sconf.f.360.cn/client_security_conf
                      Source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drString found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0
                      Source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drString found in binary or memory: http://t2.symcb.com0
                      Source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drString found in binary or memory: http://tl.symcb.com/tl.crl0
                      Source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drString found in binary or memory: http://tl.symcb.com/tl.crt0
                      Source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drString found in binary or memory: http://tl.symcd.com0&
                      Source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drString found in binary or memory: http://www.digicert.com/CPS0
                      Source: rundll32.exe, 00000009.00000002.619056856.000000000056B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jarinamaers.shop/G
                      Source: rundll32.exe, 00000009.00000002.619056856.000000000056B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jarinamaers.shop/O
                      Source: rundll32.exe, 00000009.00000002.619056856.00000000004F3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000009.00000002.619056856.0000000000508000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jarinamaers.shop/live/
                      Source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drString found in binary or memory: https://www.advancedinstaller.com
                      Source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drString found in binary or memory: https://www.digicert.com/CPS0
                      Source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drString found in binary or memory: https://www.thawte.com/cps0/
                      Source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drString found in binary or memory: https://www.thawte.com/repository0W

                      System Summary

                      barindex
                      Source: C:\Windows\System32\rundll32.exeDNS query: name: jarinamaers.shop
                      Source: C:\Windows\System32\rundll32.exeDNS query: name: jarinamaers.shop
                      Source: C:\Windows\System32\rundll32.exeDNS query: name: jarinamaers.shop
                      Source: C:\Windows\System32\rundll32.exeDNS query: name: jarinamaers.shop
                      Source: C:\Windows\System32\rundll32.exeDNS query: name: jarinamaers.shop
                      Source: C:\Windows\Installer\MSI1B42.tmpMemory allocated: 770B0000 page execute and read and writeJump to behavior
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D13C20 GetProcAddress,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,ReadProcessMemory,GetLastError,FreeLibrary,7_2_00D13C20
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0013463C GetModuleHandleW,GetCurrentProcessId,GetCurrentProcessId,GetCurrentProcessId,OpenProcess,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WideCharToMultiByte,CloseHandle,8_2_0013463C
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00137A54 NtWriteFile,8_2_00137A54
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_001378C0 NtReadFile,8_2_001378C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0013B0C4 NtOpenKey,RtlpNtOpenKey,8_2_0013B0C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0013AD34 NtAllocateVirtualMemory,8_2_0013AD34
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00137B40 NtFreeVirtualMemory,8_2_00137B40
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00137588 RtlInitUnicodeString,NtCreateFile,NtClose,8_2_00137588
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0013378C NtClose,8_2_0013378C
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_001377B0 RtlInitUnicodeString,NtCreateFile,8_2_001377B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0013B1D4 NtQueryValueKey,NtQueryValueKey,NtClose,8_2_0013B1D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_001379C8 NtClose,8_2_001379C8
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00140A18 NtQueryInformationProcess,LdrLoadDll,NtAllocateVirtualMemory,8_2_00140A18
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0013745C RtlInitUnicodeString,NtOpenFile,NtClose,8_2_0013745C
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00137694 RtlInitUnicodeString,NtDeleteFile,8_2_00137694
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00140A80 NtCreateFile,8_2_00140A80
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00140AC0 NtFreeVirtualMemory,NtFlushInstructionCache,8_2_00140AC0
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00137ACC NtClose,8_2_00137ACC
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00140AF0 NtWriteFile,8_2_00140AF0
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00140AF8 NtReadFile,8_2_00140AF8
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00140B00 NtDelayExecution,8_2_00140B00
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00137704 NtQueryInformationFile,8_2_00137704
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00140B08 NtOpenKey,NtSetValueKey,VirtualFree,OpenProcess,VirtualAllocEx,VirtualFreeEx,WriteProcessMemory,CreateRemoteThread,8_2_00140B08
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00140B28 NtQueryInformationFile,VirtualAlloc,VirtualFree,OpenProcess,VirtualAllocEx,VirtualFreeEx,WriteProcessMemory,CreateRemoteThread,8_2_00140B28
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0013CB54 NtDelayExecution,8_2_0013CB54
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001C463C GetModuleHandleW,GetCurrentProcessId,GetCurrentProcessId,GetCurrentProcessId,OpenProcess,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WideCharToMultiByte,CloseHandle,9_2_001C463C
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001CB0C4 NtOpenKey,RtlpNtOpenKey,9_2_001CB0C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001CAD34 NtAllocateVirtualMemory,9_2_001CAD34
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001CCB54 NtDelayExecution,9_2_001CCB54
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001C7B40 NtFreeVirtualMemory,9_2_001C7B40
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001C378C NtClose,9_2_001C378C
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001C77B0 RtlInitUnicodeString,NtCreateFile,9_2_001C77B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001CB1D4 NtQueryValueKey,NtQueryValueKey,NtClose,9_2_001CB1D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001D0A18 NtQueryInformationProcess,LdrLoadDll,NtAllocateVirtualMemory,9_2_001D0A18
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001C745C RtlInitUnicodeString,NtOpenFile,NtClose,9_2_001C745C
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001C7A54 NtWriteFile,9_2_001C7A54
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001C7694 RtlInitUnicodeString,NtDeleteFile,9_2_001C7694
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001C7ACC NtClose,9_2_001C7ACC
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001C78C0 NtReadFile,9_2_001C78C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001D0AC0 NtFreeVirtualMemory,NtFlushInstructionCache,9_2_001D0AC0
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001D0AF0 NtWriteFile,9_2_001D0AF0
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001C7704 NtQueryInformationFile,9_2_001C7704
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001D0B00 NtDelayExecution,9_2_001D0B00
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001C7588 RtlInitUnicodeString,NtCreateFile,NtClose,9_2_001C7588
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001C79C8 NtClose,9_2_001C79C8
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01ADAD34 NtAllocateVirtualMemory,13_2_01ADAD34
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AD7B40 NtFreeVirtualMemory,13_2_01AD7B40
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AD77B0 RtlInitUnicodeString,NtCreateFile,13_2_01AD77B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AD378C NtClose,13_2_01AD378C
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AD7588 RtlInitUnicodeString,NtCreateFile,NtClose,13_2_01AD7588
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AD79C8 NtClose,13_2_01AD79C8
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01ADB1D4 NtQueryValueKey,NtQueryValueKey,NtClose,13_2_01ADB1D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AD7704 NtQueryInformationFile,13_2_01AD7704
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AE0B00 NtDelayExecution,13_2_01AE0B00
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01ADCB54 NtDelayExecution,13_2_01ADCB54
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AD7694 RtlInitUnicodeString,NtDeleteFile,13_2_01AD7694
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AD7ACC NtClose,13_2_01AD7ACC
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01ADB0C4 NtOpenKey,13_2_01ADB0C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AD78C0 NtReadFile,13_2_01AD78C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AE0AC0 NtFreeVirtualMemory,NtFlushInstructionCache,13_2_01AE0AC0
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AD463C GetModuleHandleW,GetCurrentProcessId,GetCurrentProcessId,GetCurrentProcessId,OpenProcess,NtQueryInformationProcess,ReadProcessMemory,ReadProcessMemory,WideCharToMultiByte,CloseHandle,13_2_01AD463C
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AE0A18 NtQueryInformationProcess,LdrLoadDll,NtAllocateVirtualMemory,13_2_01AE0A18
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AD745C RtlInitUnicodeString,NtOpenFile,NtClose,13_2_01AD745C
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AD7A54 NtWriteFile,13_2_01AD7A54
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018006A2C8: DeviceIoControl,8_2_000000018006A2C8
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018004B1A4 memset,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,WTSGetActiveConsoleSessionId,WTSQueryUserToken,GetTokenInformation,DuplicateTokenEx,CreateEnvironmentBlock,CreateProcessAsUserW,GetLastError,DestroyEnvironmentBlock,CloseHandle,CloseHandle,AdjustTokenPrivileges,CloseHandle,8_2_000000018004B1A4
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\747f6e.msiJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI8029.tmpJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\747f6f.ipiJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\747f6f.ipiJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{B135729E-0574-44D1-B7A1-6E44550F506B}Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI19CA.tmpJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1B42.tmpJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI8029.tmpJump to behavior
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D16A507_2_00D16A50
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D4F0327_2_00D4F032
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D3C2CA7_2_00D3C2CA
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D492A97_2_00D492A9
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D3E2707_2_00D3E270
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D484BD7_2_00D484BD
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D3A5877_2_00D3A587
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D4D8D57_2_00D4D8D5
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D1C8707_2_00D1C870
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D3A9157_2_00D3A915
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D349207_2_00D34920
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D40A487_2_00D40A48
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D19CC07_2_00D19CC0
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D45D6D7_2_00D45D6D
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_001310308_2_00131030
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180017FE88_2_0000000180017FE8
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018006DFF48_2_000000018006DFF4
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800220D88_2_00000001800220D8
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018007C1408_2_000000018007C140
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800601748_2_0000000180060174
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018008023C8_2_000000018008023C
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018000834C8_2_000000018000834C
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018006C4708_2_000000018006C470
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800784E08_2_00000001800784E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800764F08_2_00000001800764F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800605788_2_0000000180060578
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800105808_2_0000000180010580
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018004E5DC8_2_000000018004E5DC
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800626008_2_0000000180062600
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800026108_2_0000000180002610
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800046388_2_0000000180004638
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018004A6508_2_000000018004A650
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018006E7608_2_000000018006E760
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800647B08_2_00000001800647B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018007E7C78_2_000000018007E7C7
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800769308_2_0000000180076930
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800629548_2_0000000180062954
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018006A9948_2_000000018006A994
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018006E9FC8_2_000000018006E9FC
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180082A188_2_0000000180082A18
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180072A278_2_0000000180072A27
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180010B588_2_0000000180010B58
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180026C848_2_0000000180026C84
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018001ECF48_2_000000018001ECF4
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180008E208_2_0000000180008E20
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180052FD88_2_0000000180052FD8
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018003AFE88_2_000000018003AFE8
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018005D0148_2_000000018005D014
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018006F0B48_2_000000018006F0B4
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800630CC8_2_00000001800630CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018005912C8_2_000000018005912C
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018004B1A48_2_000000018004B1A4
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800492788_2_0000000180049278
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018007B2D08_2_000000018007B2D0
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018002B2EC8_2_000000018002B2EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018006D3D48_2_000000018006D3D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800033E08_2_00000001800033E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800754808_2_0000000180075480
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800694A08_2_00000001800694A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018005958C8_2_000000018005958C
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800576DC8_2_00000001800576DC
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800097E08_2_00000001800097E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800277FC8_2_00000001800277FC
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018002D9648_2_000000018002D964
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180073B608_2_0000000180073B60
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018007BBB08_2_000000018007BBB0
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018001BC388_2_000000018001BC38
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018005DD188_2_000000018005DD18
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180073DF08_2_0000000180073DF0
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180011DF08_2_0000000180011DF0
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018005BE6C8_2_000000018005BE6C
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018004FF888_2_000000018004FF88
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001C10309_2_001C1030
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AD103013_2_01AD1030
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 000000018000CF30 appears 33 times
                      Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000000180005348 appears 71 times
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: String function: 00D33790 appears 39 times
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: String function: 00D3325F appears 103 times
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: String function: 00D33292 appears 70 times
                      Source: neo.msiBinary or memory string: OriginalFilenameviewer.exeF vs neo.msi
                      Source: neo.msiBinary or memory string: OriginalFilenameAICustAct.dllF vs neo.msi
                      Source: metadata-2.1.drBinary string: highlight.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\66program files\windows sidebar\gadgets\rssfeeds.gadgeticon.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{113527a4-45d4-4b6f-b567-97838f1b04b0}
                      Source: metadata-2.1.drBinary string: wmplayer.exe.mui22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\BBprogram files (x86)\windows sidebar\gadgets\weather.gadget\images**undocked_black_moon-new_partly-cloudy.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\((windows\diagnostics\system\device\en-us
                      Source: metadata-2.1.drBinary string: buttonup_off.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{113527a4-45d4-4b6f-b567-97838f1b04b0}
                      Source: metadata-2.1.drBinary string: system.web.dynamicdata.dll22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\BBprogram files (x86)\windows sidebar\gadgets\weather.gadget\images33docked_black_moon-waxing-gibbous_partly-cloudy.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{8702d817-5aad-4674-9ef3-4d3decd87120}
                      Source: metadata-2.1.drBinary string: system.addin.contract.dll22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{113527a4-45d4-4b6f-b567-97838f1b04b0}
                      Source: metadata-2.1.drBinary string: btn-previous-static.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{8702d817-5aad-4674-9ef3-4d3decd87120}
                      Source: metadata-2.1.drBinary string: keypad.xml22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\99program files\dvd maker\shared\dvdstyles\specialoccasion,,specialnavigationup_selectionsubpicture.png22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{8702d817-5aad-4674-9ef3-4d3decd87120}
                      Source: metadata-2.1.drBinary string: scenes_intro_bg_pal.wmv22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{113527a4-45d4-4b6f-b567-97838f1b04b0}
                      Source: metadata-2.1.drBinary string: acxtrnal.dll22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\((windows\diagnostics\system\device\en-us
                      Source: metadata-2.1.drBinary string: sbdrop.dll22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\QQprogramdata\microsoft\device stage\device\{113527a4-45d4-4b6f-b567-97838f1b04b0}
                      Source: classification engineClassification label: mal100.troj.evad.winMSI@14/22@5/0
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180049050 GetCurrentProcessId,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,SetLastError,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,OpenProcess,8_2_0000000180049050
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018004B1A4 memset,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,WTSGetActiveConsoleSessionId,WTSQueryUserToken,GetTokenInformation,DuplicateTokenEx,CreateEnvironmentBlock,CreateProcessAsUserW,GetLastError,DestroyEnvironmentBlock,CloseHandle,CloseHandle,AdjustTokenPrivileges,CloseHandle,8_2_000000018004B1A4
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180049278 LookupPrivilegeValueW,LookupPrivilegeValueW,LookupPrivilegeValueW,LookupPrivilegeValueW,??_U@YAPEAX_K@Z,GetCurrentProcess,OpenProcessToken,CreateRestrictedToken,CloseHandle,CloseHandle,AllocateAndInitializeSid,GetLengthSid,SetTokenInformation,FreeSid,AdjustTokenPrivileges,??_V@YAXPEAX@Z,8_2_0000000180049278
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018008395A DestroyEnvironmentBlock,CloseHandle,CloseHandle,AdjustTokenPrivileges,CloseHandle,8_2_000000018008395A
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D13860 CreateToolhelp32Snapshot,CloseHandle,Process32FirstW,OpenProcess,CloseHandle,Process32NextW,CloseHandle,7_2_00D13860
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D14BA0 CoInitialize,CoCreateInstance,VariantInit,ObjectStublessClient10,VariantClear,IUnknown_QueryService,ObjectStublessClient9,CoAllowSetForegroundWindow,SysAllocString,SysAllocString,SysAllocString,SysAllocString,VariantInit,OpenProcess,WaitForSingleObject,GetExitCodeProcess,CloseHandle,LocalFree,VariantClear,VariantClear,VariantClear,VariantClear,VariantClear,SysFreeString,VariantClear,OleUninitialize,_com_issue_error,7_2_00D14BA0
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D145B0 LoadResource,LockResource,SizeofResource,7_2_00D145B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180049AEC OpenSCManagerW,OpenServiceW,ChangeServiceConfigW,StartServiceW,GetTickCount,Sleep,GetTickCount,QueryServiceStatus,CloseServiceHandle,CloseServiceHandle,8_2_0000000180049AEC
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\HuMaster LLCJump to behavior
                      Source: C:\Windows\System32\msiexec.exeMutant created: \BaseNamedObjects\Local\RstrMgr-3887CAB8-533F-4C85-B0DC-3E5639F8D511-Session0000
                      Source: C:\Windows\System32\msiexec.exeMutant created: \BaseNamedObjects\Local\RstrMgr3887CAB8-533F-4C85-B0DC-3E5639F8D511
                      Source: C:\Windows\System32\rundll32.exeMutant created: \Sessions\1\BaseNamedObjects\runnung
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIADBD.tmpJump to behavior
                      Source: C:\Windows\Installer\MSI1B42.tmpKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Windows\System32\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: unknownProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Local\sharepoint\360total.dll, homq
                      Source: rundll32.exe, rundll32.exe, 00000008.00000003.405624482.0000000001FC0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmp, rundll32.exe, 00000009.00000002.619259049.0000000180086000.00000002.00000001.01000000.00000009.sdmp, Update_6a61d649.dll.8.dr, 360total.dll.1.drBinary or memory string: select * from sqlite_sequence;
                      Source: rundll32.exe, rundll32.exe, 00000008.00000003.405624482.0000000001FC0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmp, rundll32.exe, 00000009.00000002.619259049.0000000180086000.00000002.00000001.01000000.00000009.sdmp, Update_6a61d649.dll.8.dr, 360total.dll.1.drBinary or memory string: update sqlite_sequence set seq = 0 where name='MT';
                      Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\neo.msi"
                      Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 274E0059499F24D0FC6E34D9DC99A829 C
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 5FD089C2C199466E3D17DC881ED4AD10
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSI1B42.tmp "C:\Windows\Installer\MSI1B42.tmp" C:/Windows/System32/rundll32.exe C:\Users\user\AppData\Local\sharepoint\360total.dll, homq
                      Source: unknownProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Local\sharepoint\360total.dll, homq
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_6a61d649.dll", homq
                      Source: unknownProcess created: C:\Windows\System32\taskeng.exe taskeng.exe {9EB3A60F-302F-4AB2-B149-897715BB8B05} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
                      Source: C:\Windows\System32\taskeng.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_6a61d649.dll", homq
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 274E0059499F24D0FC6E34D9DC99A829 CJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 5FD089C2C199466E3D17DC881ED4AD10Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSI1B42.tmp "C:\Windows\Installer\MSI1B42.tmp" C:/Windows/System32/rundll32.exe C:\Users\user\AppData\Local\sharepoint\360total.dll, homqJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_6a61d649.dll", homq Jump to behavior
                      Source: C:\Windows\System32\taskeng.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_6a61d649.dll", homqJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: rpcrtremote.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: msihnd.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: rpcrtremote.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: dsrole.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: bcrypt.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: samlib.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: devrtl.dllJump to behavior
                      Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wow64win.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wow64cpu.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msacm32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rpcrtremote.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wow64win.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wow64cpu.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msacm32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rpcrtremote.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\Installer\MSI1B42.tmpSection loaded: wow64win.dllJump to behavior
                      Source: C:\Windows\Installer\MSI1B42.tmpSection loaded: wow64cpu.dllJump to behavior
                      Source: C:\Windows\Installer\MSI1B42.tmpSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Installer\MSI1B42.tmpSection loaded: rpcrtremote.dllJump to behavior
                      Source: C:\Windows\Installer\MSI1B42.tmpSection loaded: sxs.dllJump to behavior
                      Source: C:\Windows\System32\taskeng.exeSection loaded: ktmw32.dllJump to behavior
                      Source: C:\Windows\System32\taskeng.exeSection loaded: wevtapi.dllJump to behavior
                      Source: C:\Windows\System32\taskeng.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\taskeng.exeSection loaded: rpcrtremote.dllJump to behavior
                      Source: C:\Windows\System32\taskeng.exeSection loaded: xmllite.dllJump to behavior
                      Source: C:\Windows\System32\taskeng.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Windows\Installer\MSI1B42.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00020424-0000-0000-C000-000000000046}\InprocServer32Jump to behavior
                      Source: neo.msiStatic file information: File size 1620480 > 1048576
                      Source: Binary string: C:\JobRelease\win\Release\custact\x86\viewer.pdb: source: MSI1B42.tmp, 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmp, MSI1B42.tmp, 00000007.00000000.402335120.0000000000D57000.00000002.00000001.01000000.00000005.sdmp, neo.msi, 747f6e.msi.1.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr
                      Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdb source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.dr
                      Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdbn source: neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.dr
                      Source: Binary string: C:\JobRelease\win\Release\custact\x86\viewer.pdb source: MSI1B42.tmp, 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmp, MSI1B42.tmp, 00000007.00000000.402335120.0000000000D57000.00000002.00000001.01000000.00000005.sdmp, neo.msi, 747f6e.msi.1.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr
                      Source: Binary string: C:\vmagent_new\bin\joblist\574019\out\Release\360Util64.pdb source: rundll32.exe, 00000008.00000003.405624482.0000000001FC0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmp, rundll32.exe, 00000009.00000002.619259049.0000000180086000.00000002.00000001.01000000.00000009.sdmp, Update_6a61d649.dll.8.dr, 360total.dll.1.dr
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800033E0 memset,memset,memset,memset,CreateFileW,GetFileInformationByHandle,ReadFile,ReadFile,CoTaskMemAlloc,ReadFile,CoTaskMemFree,SetFilePointer,ReadFile,SetFilePointer,ReadFile,SetFilePointer,??_U@YAPEAX_K@Z,ReadFile,??_U@YAPEAX_K@Z,ReadFile,??_U@YAPEAX_K@Z,ReadFile,??_U@YAPEAX_K@Z,ReadFile,PathRemoveFileSpecW,PathCombineW,PathRemoveFileSpecW,PathCombineW,free,??_U@YAPEAX_K@Z,ReadFile,ReadFile,SetFilePointer,ReadFile,ReadFile,ReadFile,ILFree,ReadFile,memset,GetSystemDirectoryW,LoadLibraryW,GetProcAddress,CoTaskMemFree,GetLastError,FreeLibrary,CloseHandle,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,SetLastError,8_2_00000001800033E0
                      Source: 360total.dll.1.drStatic PE information: real checksum: 0xd8785 should be: 0xe745c
                      Source: Update_6a61d649.dll.8.drStatic PE information: real checksum: 0xd8785 should be: 0xe745c
                      Source: 360total.dll.1.drStatic PE information: section name: wsgi2
                      Source: Update_6a61d649.dll.8.drStatic PE information: section name: wsgi2
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D3323C push ecx; ret 7_2_00D3324F
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180010451 push rcx; ret 8_2_0000000180010452
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018001045A push rcx; ret 8_2_000000018001045B
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001801758FC push rsp; ret 8_2_00000001801758FD
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180175CDE push 2027C70Fh; ret 8_2_0000000180175CE5

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\Windows\System32\msiexec.exeExecutable created and started: C:\Windows\Installer\MSI1B42.tmpJump to behavior
                      Source: C:\Windows\System32\rundll32.exeFile created: :wtfbbq (copy)Jump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI829C.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSIADBD.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI825B.tmpJump to dropped file
                      Source: C:\Windows\System32\rundll32.exeFile created: C:\Users\user\AppData\Roaming\Custom_update\Update_6a61d649.dllJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI82BC.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1B42.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI8029.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\sharepoint\360total.dllJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Local\Temp\MSI827B.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1B42.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI8029.tmpJump to dropped file
                      Source: metadata-2.1.drBinary or memory string: bcdedit.exe22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\
                      Source: metadata-2.1.drBinary or memory string: bcdedit.exe.mui22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\
                      Source: C:\Windows\System32\msiexec.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisherJump to behavior
                      Source: C:\Windows\System32\msiexec.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestoreJump to behavior
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180049AEC OpenSCManagerW,OpenServiceW,ChangeServiceConfigW,StartServiceW,GetTickCount,Sleep,GetTickCount,QueryServiceStatus,CloseServiceHandle,CloseServiceHandle,8_2_0000000180049AEC
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180062148 memset,GetModuleFileNameW,PathCombineW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,8_2_0000000180062148
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Windows\System32\rundll32.exeCode function: EnterCriticalSection,memset,GetModuleFileNameW,PathAppendW,StrStrIW,PathFileExistsW,PathAppendW,PathFileExistsW,memset,SHGetValueW,PathAppendW,PathFileExistsW,LoadLibraryW,GetProcAddress,GetProcAddress,GetModuleFileNameW,PathAppendW,PathFileExistsW,PathAppendW,PathFileExistsW,memset,SHGetValueW,PathAppendW,PathFileExistsW,LoadLibraryW,GetProcAddress,GetProcAddress,LeaveCriticalSection,8_2_00000001800655A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180049AEC8_2_0000000180049AEC
                      Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,GetAdaptersInfo,8_2_001368E8
                      Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,GetAdaptersInfo,wsprintfA,wsprintfA,wsprintfA,GetComputerNameExA,wsprintfA,GetComputerNameExA,wsprintfA,8_2_00137FA8
                      Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,GetAdaptersInfo,9_2_001C68E8
                      Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,GetAdaptersInfo,wsprintfA,wsprintfA,wsprintfA,GetComputerNameExA,wsprintfA,GetComputerNameExA,wsprintfA,9_2_001C7FA8
                      Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,GetAdaptersInfo,13_2_01AD68E8
                      Source: C:\Windows\System32\rundll32.exeCode function: GetAdaptersInfo,GetAdaptersInfo,wsprintfA,wsprintfA,wsprintfA,GetComputerNameExA,wsprintfA,GetComputerNameExA,wsprintfA,13_2_01AD7FA8
                      Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 647Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeWindow / User API: threadDelayed 9092Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeDropped PE file which has not been started: :wtfbbq (copy)Jump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI829C.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI825B.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSIADBD.tmpJump to dropped file
                      Source: C:\Windows\System32\rundll32.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Custom_update\Update_6a61d649.dllJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI82BC.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI8029.tmpJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\sharepoint\360total.dllJump to dropped file
                      Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI827B.tmpJump to dropped file
                      Source: C:\Windows\Installer\MSI1B42.tmpCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_7-34046
                      Source: C:\Windows\System32\rundll32.exeAPI coverage: 1.6 %
                      Source: C:\Windows\System32\rundll32.exeAPI coverage: 8.5 %
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180049AEC8_2_0000000180049AEC
                      Source: C:\Windows\System32\msiexec.exe TID: 828Thread sleep time: -300000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\msiexec.exe TID: 3792Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\msiexec.exe TID: 1648Thread sleep time: -720000s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exe TID: 3084Thread sleep time: -120000s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exe TID: 3796Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\msiexec.exe TID: 3368Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Windows\Installer\MSI1B42.tmp TID: 3560Thread sleep time: -180000s >= -30000sJump to behavior
                      Source: C:\Windows\Installer\MSI1B42.tmp TID: 3560Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\rundll32.exe TID: 3584Thread sleep count: 261 > 30Jump to behavior
                      Source: C:\Windows\System32\rundll32.exe TID: 3584Thread sleep time: -261000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\rundll32.exe TID: 3632Thread sleep count: 647 > 30Jump to behavior
                      Source: C:\Windows\System32\rundll32.exe TID: 3632Thread sleep time: -64700s >= -30000sJump to behavior
                      Source: C:\Windows\System32\rundll32.exe TID: 3584Thread sleep count: 9092 > 30Jump to behavior
                      Source: C:\Windows\System32\rundll32.exe TID: 3584Thread sleep time: -9092000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\taskeng.exe TID: 3684Thread sleep time: -60000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D4AF79 FindFirstFileExW,7_2_00D4AF79
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0013A350 FindFirstFileW,FindNextFileW,LoadLibraryW,LoadLibraryExW,8_2_0013A350
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00131A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose,8_2_00131A08
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00140DD8 FindFirstFileA,8_2_00140DD8
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00140DE0 FindFirstFileW,8_2_00140DE0
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001CA350 FindFirstFileW,FindNextFileW,LoadLibraryW,LoadLibraryExW,9_2_001CA350
                      Source: C:\Windows\System32\rundll32.exeCode function: 9_2_001C1A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose,9_2_001C1A08
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01ADA350 FindFirstFileW,FindNextFileW,LoadLibraryW,LoadLibraryExW,13_2_01ADA350
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AE0DE0 FindFirstFileW,13_2_01AE0DE0
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AE0DD8 FindFirstFileA,13_2_01AE0DD8
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AD1A08 FindFirstFileA,wsprintfA,FindNextFileA,FindClose,13_2_01AD1A08
                      Source: rundll32.exe, 00000008.00000002.446788834.00000000001D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: "MWar_VMware_SATA_CD01______
                      Source: metadata-2.1.drBinary or memory string: lsm.exe22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\--windows\system32\migwiz\replacementmanifests,,microsoft-hyper-v-migration-replacement.man22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\
                      Source: metadata-2.1.drBinary or memory string: iasmigplugin-dl.man22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\--windows\system32\migwiz\replacementmanifests33microsoft-hyper-v-client-migration-replacement.man22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\##windows\system32\spp\tokens\ppdlic
                      Source: metadata-2.1.drBinary or memory string: iasmigplugin-dl.man22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\--windows\syswow64\migwiz\replacementmanifests33microsoft-hyper-v-client-migration-replacement.man22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\,,program files (x86)\internet explorer\en-us
                      Source: metadata-2.1.drBinary or memory string: imscmig.dll22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\--windows\system32\migwiz\replacementmanifests44microsoft-hyper-v-drivers-migration-replacement.man22\\?\Volume{8049f198-1016-11e7-b87b-806e6f6e6963}\
                      Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00140A18 NtQueryInformationProcess,LdrLoadDll,NtAllocateVirtualMemory,8_2_00140A18
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D1D0A5 IsDebuggerPresent,OutputDebugStringW,7_2_00D1D0A5
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180066C3C memset,GetLastError,IsDebuggerPresent,OutputDebugStringW,8_2_0000000180066C3C
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800033E0 memset,memset,memset,memset,CreateFileW,GetFileInformationByHandle,ReadFile,ReadFile,CoTaskMemAlloc,ReadFile,CoTaskMemFree,SetFilePointer,ReadFile,SetFilePointer,ReadFile,SetFilePointer,??_U@YAPEAX_K@Z,ReadFile,??_U@YAPEAX_K@Z,ReadFile,??_U@YAPEAX_K@Z,ReadFile,??_U@YAPEAX_K@Z,ReadFile,PathRemoveFileSpecW,PathCombineW,PathRemoveFileSpecW,PathCombineW,free,??_U@YAPEAX_K@Z,ReadFile,ReadFile,SetFilePointer,ReadFile,ReadFile,ReadFile,ILFree,ReadFile,memset,GetSystemDirectoryW,LoadLibraryW,GetProcAddress,CoTaskMemFree,GetLastError,FreeLibrary,CloseHandle,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,??_V@YAXPEAX@Z,SetLastError,8_2_00000001800033E0
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D42DCC mov ecx, dword ptr fs:[00000030h]7_2_00D42DCC
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D4AD78 mov eax, dword ptr fs:[00000030h]7_2_00D4AD78
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D12310 GetProcessHeap,7_2_00D12310
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D3353F SetUnhandledExceptionFilter,7_2_00D3353F
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D333A8 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00D333A8
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D32968 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_00D32968
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D36E1B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00D36E1B
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180070760 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_0000000180070760
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018006F6E0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_000000018006F6E0

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\rundll32.exeDomain query: jarinamaers.shop
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00140B08 NtOpenKey,NtSetValueKey,VirtualFree,OpenProcess,VirtualAllocEx,VirtualFreeEx,WriteProcessMemory,CreateRemoteThread,8_2_00140B08
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00140B38 RtlFormatCurrentUserKeyPath,VirtualAlloc,VirtualFree,OpenProcess,VirtualAllocEx,VirtualFreeEx,WriteProcessMemory,CreateRemoteThread,8_2_00140B38
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00140B28 NtQueryInformationFile,VirtualAlloc,VirtualFree,OpenProcess,VirtualAllocEx,VirtualFreeEx,WriteProcessMemory,CreateRemoteThread,8_2_00140B28
                      Source: C:\Windows\System32\rundll32.exeCode function: 13_2_01AE0B38 RtlFormatCurrentUserKeyPath,VirtualAlloc,VirtualFree,OpenProcess,VirtualAllocEx,VirtualFreeEx,WriteProcessMemory,CreateRemoteThread,13_2_01AE0B38
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D152F0 GetWindowsDirectoryW,GetForegroundWindow,ShellExecuteExW,ShellExecuteExW,ShellExecuteExW,GetModuleHandleW,GetModuleHandleW,GetProcAddress,GetProcAddress,AllowSetForegroundWindow,GetModuleHandleW,GetProcAddress,Sleep,Sleep,EnumWindows,BringWindowToTop,WaitForSingleObject,GetExitCodeProcess,7_2_00D152F0
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 274E0059499F24D0FC6E34D9DC99A829 CJump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 5FD089C2C199466E3D17DC881ED4AD10Jump to behavior
                      Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSI1B42.tmp "C:\Windows\Installer\MSI1B42.tmp" C:/Windows/System32/rundll32.exe C:\Users\user\AppData\Local\sharepoint\360total.dll, homqJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_6a61d649.dll", homq Jump to behavior
                      Source: C:\Windows\System32\taskeng.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_6a61d649.dll", homqJump to behavior
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018004A650 memset,GetModuleFileNameW,PathAppendW,ShellExecuteExW,ILGetSize,GetTickCount,srand,GetCurrentProcess,GetProcessId,GetCurrentThreadId,rand,LocalAlloc,InitializeSecurityDescriptor,LocalFree,SetSecurityDescriptorDacl,CreateFileMappingW,LocalFree,CreateFileMappingW,MapViewOfFile,CloseHandle,memset,memmove,memmove,memmove,memmove,memmove,UnmapViewOfFile,FindWindowW,SetForegroundWindow,memset,wsprintfW,memset,WaitForSingleObject,Sleep,CloseHandle,CloseHandle,CloseHandle,8_2_000000018004A650
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180049278 LookupPrivilegeValueW,LookupPrivilegeValueW,LookupPrivilegeValueW,LookupPrivilegeValueW,??_U@YAPEAX_K@Z,GetCurrentProcess,OpenProcessToken,CreateRestrictedToken,CloseHandle,CloseHandle,AllocateAndInitializeSid,GetLengthSid,SetTokenInformation,FreeSid,AdjustTokenPrivileges,??_V@YAXPEAX@Z,8_2_0000000180049278
                      Source: 360total.dll.1.drBinary or memory string: Program managerProgmanSeShutdownPrivilegeSeTimeZonePrivilegeSeIncreaseWorkingSetPrivilegeSeUndockPrivilegeSeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeEnableLUASoftware\Microsoft\Windows\CurrentVersion\Policies\Systemseclogonwdc.dllWdcRunTaskAsInteractiveUser"%s" %swinsta0\defaultadvapi32.dllCreateProcessWithTokenW:open..\360DeskAna64.exe%u_%d_%d_%d_%use2/%s %s %use1SeTcbPrivilegeNT AUTHORITYLOCAL SERVICENETWORK SERVICE360utilexplorer.exe,
                      Source: rundll32.exeBinary or memory string: Progman
                      Source: rundll32.exeBinary or memory string: Program manager
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D335A9 cpuid 7_2_00D335A9
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: EnumSystemLocalesW,7_2_00D4E0C6
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: EnumSystemLocalesW,7_2_00D4E1AC
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: EnumSystemLocalesW,7_2_00D4E111
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: EnumSystemLocalesW,7_2_00D47132
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,7_2_00D4E237
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: GetLocaleInfoEx,7_2_00D323F8
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: GetLocaleInfoW,7_2_00D4E48A
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,7_2_00D4E5B3
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: GetLocaleInfoW,7_2_00D4E6B9
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: GetLocaleInfoW,7_2_00D476AF
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,7_2_00D4E788
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,7_2_00D4DE24
                      Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D337D5 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,7_2_00D337D5
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00138AE0 GetUserNameA,wsprintfA,8_2_00138AE0
                      Source: C:\Windows\Installer\MSI1B42.tmpCode function: 7_2_00D47B1F GetTimeZoneInformation,7_2_00D47B1F
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00138560 RtlGetVersion,GetVersionExW,8_2_00138560
                      Source: C:\Windows\Installer\MSI1B42.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: rundll32.exeBinary or memory string: 360tray.exe
                      Source: rundll32.exeBinary or memory string: SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\App Paths\360safe.exe
                      Source: rundll32.exeBinary or memory string: SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\360safe.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 13.2.rundll32.exe.2a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.2a0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.110000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.130000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.1ad0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.1ad0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.110000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.1c0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.130000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.a0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.1c0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000009.00000003.614395824.0000000000470000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.446771476.00000000000A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.619163772.0000000001E80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.420736655.00000000002A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.619168848.0000000001F0A000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.420775529.0000000001AD0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.618961213.0000000000110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.619007012.00000000001C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 3580, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 13.2.rundll32.exe.2a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.2a0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.110000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.130000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.1ad0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 13.2.rundll32.exe.1ad0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.110000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.1c0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.130000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.rundll32.exe.a0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 9.2.rundll32.exe.1c0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000009.00000003.614395824.0000000000470000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.446771476.00000000000A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.619163772.0000000001E80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.420736655.00000000002A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.619168848.0000000001F0A000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000D.00000002.420775529.0000000001AD0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.618961213.0000000000110000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000009.00000002.619007012.00000000001C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 3580, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire Infrastructure1
                      Valid Accounts
                      2
                      Native API
                      1
                      DLL Side-Loading
                      1
                      Exploitation for Privilege Escalation
                      1
                      Deobfuscate/Decode Files or Information
                      OS Credential Dumping2
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      1
                      Ingress Tool Transfer
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomains1
                      Replication Through Removable Media
                      1
                      Scheduled Task/Job
                      1
                      Valid Accounts
                      1
                      DLL Side-Loading
                      2
                      Obfuscated Files or Information
                      LSASS Memory11
                      Peripheral Device Discovery
                      Remote Desktop ProtocolData from Removable Media2
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts2
                      Service Execution
                      21
                      Windows Service
                      1
                      Valid Accounts
                      1
                      DLL Side-Loading
                      Security Account Manager1
                      Account Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive1
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCron1
                      Scheduled Task/Job
                      11
                      Access Token Manipulation
                      1
                      File Deletion
                      NTDS1
                      File and Directory Discovery
                      Distributed Component Object ModelInput Capture11
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchd1
                      Bootkit
                      21
                      Windows Service
                      121
                      Masquerading
                      LSA Secrets35
                      System Information Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts212
                      Process Injection
                      1
                      Valid Accounts
                      Cached Domain Credentials351
                      Security Software Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
                      Scheduled Task/Job
                      1
                      Virtualization/Sandbox Evasion
                      DCSync1
                      Virtualization/Sandbox Evasion
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                      Access Token Manipulation
                      Proc Filesystem3
                      Process Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                      Process Injection
                      /etc/passwd and /etc/shadow1
                      Application Window Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                      Bootkit
                      Network Sniffing1
                      System Owner/User Discovery
                      Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd11
                      Rundll32
                      Input Capture1
                      Remote System Discovery
                      Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                      Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled TaskEmbedded PayloadsKeylogging1
                      System Network Configuration Discovery
                      Taint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1432285 Sample: neo.msi Startdate: 26/04/2024 Architecture: WINDOWS Score: 100 48 Found malware configuration 2->48 50 Multi AV Scanner detection for dropped file 2->50 52 Yara detected Latrodectus 2->52 54 2 other signatures 2->54 6 rundll32.exe 2 2->6         started        10 msiexec.exe 22 31 2->10         started        12 msiexec.exe 9 2->12         started        14 taskeng.exe 1 2->14         started        process3 file4 27 C:\Users\user\AppData\...\Update_6a61d649.dll, PE32+ 6->27 dropped 29 :wtfbbq (copy), PE32+ 6->29 dropped 56 System process connects to network (likely due to code injection or exploit) 6->56 58 Contains functionality to inject threads in other processes 6->58 60 Rundll32 performs DNS lookup (likely malicious behavior) 6->60 64 2 other signatures 6->64 16 rundll32.exe 9 6->16         started        31 C:\Windows\Installer\MSI1B42.tmp, PE32 10->31 dropped 33 C:\Windows\Installer\MSI8029.tmp, PE32 10->33 dropped 35 C:\Users\user\AppData\Local\...\360total.dll, PE32+ 10->35 dropped 62 Drops executables to the windows directory (C:\Windows) and starts them 10->62 19 MSI1B42.tmp 10->19         started        21 msiexec.exe 10->21         started        23 msiexec.exe 10->23         started        37 C:\Users\user\AppData\Local\...\MSIADBD.tmp, PE32 12->37 dropped 39 C:\Users\user\AppData\Local\...\MSI82BC.tmp, PE32 12->39 dropped 41 C:\Users\user\AppData\Local\...\MSI829C.tmp, PE32 12->41 dropped 43 2 other files (none is malicious) 12->43 dropped 25 rundll32.exe 14->25         started        signatures5 process6 dnsIp7 45 jarinamaers.shop 16->45 signatures8 66 System process connects to network (likely due to code injection or exploit) 45->66 68 Rundll32 performs DNS lookup (likely malicious behavior) 45->68

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      :wtfbbq (copy)10%VirustotalBrowse
                      C:\Users\user\AppData\Local\Temp\MSI825B.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\MSI825B.tmp0%VirustotalBrowse
                      C:\Users\user\AppData\Local\Temp\MSI827B.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\MSI827B.tmp0%VirustotalBrowse
                      C:\Users\user\AppData\Local\Temp\MSI829C.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\MSI829C.tmp0%VirustotalBrowse
                      C:\Users\user\AppData\Local\Temp\MSI82BC.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\MSI82BC.tmp0%VirustotalBrowse
                      C:\Users\user\AppData\Local\Temp\MSIADBD.tmp0%ReversingLabs
                      C:\Users\user\AppData\Local\Temp\MSIADBD.tmp0%VirustotalBrowse
                      C:\Users\user\AppData\Local\sharepoint\360total.dll10%VirustotalBrowse
                      C:\Users\user\AppData\Roaming\Custom_update\Update_6a61d649.dll10%VirustotalBrowse
                      C:\Windows\Installer\MSI1B42.tmp0%ReversingLabs
                      C:\Windows\Installer\MSI1B42.tmp0%VirustotalBrowse
                      C:\Windows\Installer\MSI8029.tmp0%ReversingLabs
                      C:\Windows\Installer\MSI8029.tmp0%VirustotalBrowse
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      jarinamaers.shop1%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      https://jarinamaers.shop/O0%Avira URL Cloudsafe
                      https://startmast.shop/live/0%Avira URL Cloudsafe
                      https://jarinamaers.shop/G0%Avira URL Cloudsafe
                      ftp://ftp%2desktop.ini0%Avira URL Cloudsafe
                      https://jarinamaers.shop/live/0%Avira URL Cloudsafe
                      https://jarinamaers.shop/live/1%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      jarinamaers.shop
                      104.21.46.75
                      truetrueunknown
                      NameMaliciousAntivirus DetectionReputation
                      https://startmast.shop/live/true
                      • Avira URL Cloud: safe
                      unknown
                      https://jarinamaers.shop/live/true
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://pscan.f.360.cn/safe_update.phprundll32.exefalse
                        high
                        https://jarinamaers.shop/Orundll32.exe, 00000009.00000002.619056856.000000000056B000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://dr.f.360.cn/scanlistrundll32.exe, 00000008.00000003.405624482.0000000001FC0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmp, rundll32.exe, 00000009.00000002.619259049.0000000180086000.00000002.00000001.01000000.00000009.sdmp, Update_6a61d649.dll.8.dr, 360total.dll.1.drfalse
                          high
                          https://www.thawte.com/cps0/neo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drfalse
                            high
                            http://pscan.f.360.cn/safe_update.phphttp://pconf.f.360.cn/safe_update.phphttp://sconf.f.360.cn/clierundll32.exe, 00000008.00000003.405624482.0000000001FC0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmp, rundll32.exe, 00000009.00000002.619259049.0000000180086000.00000002.00000001.01000000.00000009.sdmp, Update_6a61d649.dll.8.dr, 360total.dll.1.drfalse
                              high
                              https://www.thawte.com/repository0Wneo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drfalse
                                high
                                http://pconf.f.360.cn/safe_update.phprundll32.exefalse
                                  high
                                  ftp://ftp%2desktop.inirundll32.exe, 00000008.00000003.405624482.0000000001FC0000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmp, rundll32.exe, 00000009.00000002.619259049.0000000180086000.00000002.00000001.01000000.00000009.sdmp, Update_6a61d649.dll.8.dr, 360total.dll.1.drfalse
                                  • Avira URL Cloud: safe
                                  low
                                  http://sconf.f.360.cn/client_security_confrundll32.exefalse
                                    high
                                    http://dr.f.360.cn/scanrundll32.exefalse
                                      high
                                      https://www.advancedinstaller.comneo.msi, 747f6e.msi.1.dr, MSI8029.tmp.1.dr, MSI829C.tmp.0.dr, MSIADBD.tmp.0.dr, MSI827B.tmp.0.dr, MSI19CA.tmp.1.dr, MSI1B42.tmp.1.dr, MSI82BC.tmp.0.dr, MSI825B.tmp.0.drfalse
                                        high
                                        https://jarinamaers.shop/Grundll32.exe, 00000009.00000002.619056856.000000000056B000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        No contacted IP infos
                                        Joe Sandbox version:40.0.0 Tourmaline
                                        Analysis ID:1432285
                                        Start date and time:2024-04-26 19:24:05 +02:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 7m 13s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                        Number of analysed new started processes analysed:17
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:neo.msi
                                        Detection:MAL
                                        Classification:mal100.troj.evad.winMSI@14/22@5/0
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HCA Information:
                                        • Successful, ratio: 99%
                                        • Number of executed functions: 52
                                        • Number of non-executed functions: 326
                                        Cookbook Comments:
                                        • Found application associated with file extension: .msi
                                        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, VSSVC.exe, svchost.exe
                                        • Excluded IPs from analysis (whitelisted): 104.208.16.93
                                        • Excluded domains from analysis (whitelisted): onedsblobprdcus07.centralus.cloudapp.azure.com, watson.microsoft.com, legacywatson.trafficmanager.net
                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                        • Report size getting too big, too many NtCreateFile calls found.
                                        • Report size getting too big, too many NtFsControlFile calls found.
                                        • Report size getting too big, too many NtOpenFile calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        TimeTypeDescription
                                        19:24:56API Interceptor1894x Sleep call for process: msiexec.exe modified
                                        19:25:21API Interceptor146x Sleep call for process: MSI1B42.tmp modified
                                        19:25:27API Interceptor117x Sleep call for process: taskeng.exe modified
                                        19:26:02API Interceptor2355164x Sleep call for process: rundll32.exe modified
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        jarinamaers.shopad.msiGet hashmaliciousLatrodectusBrowse
                                        • 104.21.46.75
                                        Document_a19_79b555791-28h97348k5477-3219g9.jsGet hashmaliciousLatrodectusBrowse
                                        • 172.67.136.103
                                        360total.dll.dllGet hashmaliciousLatrodectusBrowse
                                        • 172.67.136.103
                                        ad.msiGet hashmaliciousLatrodectusBrowse
                                        • 104.21.46.75
                                        No context
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        C:\Users\user\AppData\Local\Temp\MSI827B.tmpad.msiGet hashmaliciousLatrodectusBrowse
                                          Document_a19_79b555791-28h97348k5477-3219g9.jsGet hashmaliciousLatrodectusBrowse
                                            ad.msiGet hashmaliciousLatrodectusBrowse
                                              avp.msiGet hashmaliciousUnknownBrowse
                                                Cheater Pro 1.6.0.msiGet hashmaliciousUnknownBrowse
                                                  Cheat Lab 2.7.2.msiGet hashmaliciousUnknownBrowse
                                                    payload.jsGet hashmaliciousUnknownBrowse
                                                      payload.jsGet hashmaliciousUnknownBrowse
                                                        Doc_m42_81h118103-88o62135w8623-1999q9.jsGet hashmaliciousUnknownBrowse
                                                          avp.msiGet hashmaliciousUnknownBrowse
                                                            C:\Users\user\AppData\Local\Temp\MSI825B.tmpad.msiGet hashmaliciousLatrodectusBrowse
                                                              Document_a19_79b555791-28h97348k5477-3219g9.jsGet hashmaliciousLatrodectusBrowse
                                                                ad.msiGet hashmaliciousLatrodectusBrowse
                                                                  avp.msiGet hashmaliciousUnknownBrowse
                                                                    Cheater Pro 1.6.0.msiGet hashmaliciousUnknownBrowse
                                                                      Cheat Lab 2.7.2.msiGet hashmaliciousUnknownBrowse
                                                                        payload.jsGet hashmaliciousUnknownBrowse
                                                                          payload.jsGet hashmaliciousUnknownBrowse
                                                                            Doc_m42_81h118103-88o62135w8623-1999q9.jsGet hashmaliciousUnknownBrowse
                                                                              avp.msiGet hashmaliciousUnknownBrowse
                                                                                Process:C:\Windows\System32\rundll32.exe
                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):906752
                                                                                Entropy (8bit):6.271226161679794
                                                                                Encrypted:false
                                                                                SSDEEP:12288:WfPSAAUHV4fZUv/TrguVTax7hNRu18VAyJFoxMk/wYeDKDMyPDi:MPSAAUHV4fZUvfgmaxpu1FyJ6xMYHMke
                                                                                MD5:BD3A3714EE9A071EBEB59AC91D9EBB5A
                                                                                SHA1:55110A221F20A4CEEC34C58D0179FA31F8C102E9
                                                                                SHA-256:4CF2B612939359977DF51A32D2F63E2CB0C6C601E114B8E4812BD548D1DB85FE
                                                                                SHA-512:7244220F29057339C99A22C20268187BA6F6681251F4CE4F305AD22DC030F6078B4F298EF10AD392DC5D036C41C7B8C28C2BD997EA39EF7AB023CB9B5C946DC8
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: Virustotal, Detection: 10%, Browse
                                                                                Reputation:low
                                                                                Preview:MZ......................@...................................h...........!..L.!This program cannot be run in DOS mode....$........,>5.MPf.MPf.MPf.<Qg.MPf..Qg.MPf.%Tg.MPf.%Sg.MPf.&Ug.MPf-$Qg.MPf.<Ug.MPf.<Ug.MPf+.f.MPf/$Tg.MPf.*Ug.MPf.*Tg.MPf/$Ug.MPf.$Ug.MPf.%Ug.MPf.&Tg.MPf.&Vg.MPf.&Qg.MPf.MQfoLPf.$Yg.MPf.$Pg.MPf.$.f.MPf.M.f.MPf.$Rg.MPfRich.MPf................PE..d...:5.`..........# .....J..........`........................................@............ ..........................................+......`,..,....0...........d......H?...@..........T.......................(....................`...............................text...(I.......J.................. ..`.rdata.......`.......N..............@..@.data....e...P...0...<..............@....pdata...d.......f...l..............@..@.rsrc........0......................@..@.reloc.......@......................@..Bwsgi2........P.........................@..........!1)FX?@T#s9Cey$lE<HI0x&%czAYeH9a))*C9%fd8%Z<@zCvcK....................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:modified
                                                                                Size (bytes):1204
                                                                                Entropy (8bit):5.67558499361017
                                                                                Encrypted:false
                                                                                SSDEEP:24:zgyI6AE6jIMaI3I4iItRpUcFPRMi4iDDhiSrokfCLK:zB+jhaxt+bTPRMi4iDD8Srx
                                                                                MD5:EA918F400E4A1EB3E4527F94AD42A8E2
                                                                                SHA1:49B4A4675B082257E39692BEE2CA653CE166D0CE
                                                                                SHA-256:1BA0EC81998B368DAD946B67B0E6B82286340DD3CCCA0E4EE843C0947CAC6C08
                                                                                SHA-512:6FD0072CECD7D13E17B9E9BF34E299E3B51F1762F8F91308DF995CB83146DEE9DFD71B5315C393FD35C0658AF811492239709BC0EBB6E0C84F4C3DC4A03720B8
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:...@IXOS.@.....@...X.@.....@.....@.....@.....@.....@......&.{B135729E-0574-44D1-B7A1-6E44550F506B}..360 Total..neo.msi.@.....@.....@.....@........&.{6C81CEE0-3161-4D91-A688-254B67D7D838}.....@.....@.....@.....@.......@.....@.....@.......@......360 Total......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{B48CC27C-9823-4256-8235-834BFD2D0DBB}&.{B135729E-0574-44D1-B7A1-6E44550F506B}.@......&.{4A323D5F-6D73-4C26-8E39-BE8928DA13EB}&.{B135729E-0574-44D1-B7A1-6E44550F506B}.@......&.{ADF9F598-7B84-45C9-B1CA-E80968A538BA}&.{B135729E-0574-44D1-B7A1-6E44550F506B}.@........CreateFolders..Creating folders..Folder: [1]#.6.C:\Users\user\AppData\Roaming\HuMaster LLC\360 Total\.@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]..(.C:\Users\user\AppData\Local\sharepoint\....4.C:\Users\user\AppData\Local\sharepoint\360total.dll....WriteRegistryValues..Writing system registry va
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):3048
                                                                                Entropy (8bit):3.669078455925044
                                                                                Encrypted:false
                                                                                SSDEEP:48:qDGv+6N38RN3xp/7wP8c1SFjwL7feGp9bHfOIgbR1fOIgBKEBKRC6v6Rey8H:qDGvJ4PUiF8fHzbOHXOHB9BpiV
                                                                                MD5:75CDF3F1112E5F9922F9E1CC3A34E72D
                                                                                SHA1:26DFEE703703EB5DCA338D58B04FC42579AEF31B
                                                                                SHA-256:BBD26345804B58BE3F41323421CB492DA1426253CD82DD8EB82C916889CF0690
                                                                                SHA-512:AF42CC8A966E750F1F45B797A68B6DAE1B7E48B3EDC3AEC7CCCB58E7A13856642D7C2CDBFAEEA3B17E0788819C7EE94F6D6E8B47B5AE4D93AE17E7827BDE6BA9
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:.D.....M..,....c...6.....................xA..yJL.N..T...9.........z............M..0.<fK...; ...............................$.......8...............I.n.s.t.a.l.l.e.d. .3.6.0. .T.o.t.a.l...............C.:.\.W.i.n.d.o.w.s.\...............3.0.2.4.9.4.................W.O.R.K.G.R.O.U.P.........A.'.3C..wZ......................).(?..P............. ...2.......2...\.\.?.\.V.o.l.u.m.e.{.8.0.4.9.f.1.9.8.-.1.0.1.6.-.1.1.e.7.-.b.8.7.b.-.8.0.6.e.6.f.6.e.6.9.6.3.}.\...............C.:.\...........N).A.j..j...............(...0.......,...2.......2...\.\.?.\.V.o.l.u.m.e.{.8.0.4.9.f.1.9.8.-.1.0.1.6.-.1.1.e.7.-.b.8.7.b.-.8.0.6.e.6.f.6.e.6.9.6.3.}.\.......4...............(.C.:.).........<...@...D...H...L...P...T...X...\...`...d...h...l...p...t...x...|...........%.......%...A.d.o.b.e. .A.c.r.o.b.a.t. .R.e.a.d.e.r. .D.C. .1.9...0.1.0...2.0.0.9.8.....).......)...A.d.o.b.e. .F.l.a.s.h. .P.l.a.y.e.r. .2.5. .A.c.t.i.v.e.X. .2.5...0...0...1.2.7.....'.......'...A.d.o.b.e. .F.l.a.s.h. .P.l.a.y.e.r. .2.5. .N.P.A.P.
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:SysEx File - Twister
                                                                                Category:dropped
                                                                                Size (bytes):9068216
                                                                                Entropy (8bit):3.679389249730728
                                                                                Encrypted:false
                                                                                SSDEEP:12288:GF4TYOYEzT4G09w6LB9K43gd8caDtDIY8/mhjTLQSI5JnJYKnAOYlTL9VZYbEIIw:s4j69g8caP7y0ljdAGmm/rmHp
                                                                                MD5:1BD864E31838B776694C4E0B26CCAE68
                                                                                SHA1:9851F2BE7B3335BF27FABD2B48F2D3FBD83252B0
                                                                                SHA-256:2C0B39FED8EF3BD4215C5AE1CE8BDFA627436F44DBD0AFCB6D1852FAD5474940
                                                                                SHA-512:88C177985B8E675A8923552D4E71518168244A01B57F6F286B90FA644DDA7928170B3864BB2AF3B99FB3B583CC4CCB2097705CAD0E3F7429E0FD50A8485782CD
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:.%..=..J.....>.(4].y............^...................... ...Y.......Y...<.B.A.C.K.U.P._.C.O.M.P.O.N.E.N.T.S. .x.m.l.n.s.=.".x.-.s.c.h.e.m.a.:.#.V.s.s.C.o.m.p.o.n.e.n.t.M.e.t.a.d.a.t.a.". .v.e.r.s.i.o.n.=.".1...2.". .b.o.o.t.a.b.l.e.S.y.s.t.e.m.S.t.a.t.e.B.a.c.k.u.p.=.".y.e.s.". .s.e.l.e.c.t.C.o.m.p.o.n.e.n.t.s.=.".y.e.s.". .b.a.c.k.u.p.T.y.p.e.=.".f.u.l.l.". .p.a.r.t.i.a.l.F.i.l.e.S.u.p.p.o.r.t.=.".y.e.s.". .s.n.a.p.s.h.o.t.S.e.t.I.d.=.".f.1.4.1.7.8.e.e.-.7.9.d.6.-.4.c.4.a.-.8.0.4.e.-.c.1.8.3.5.4.b.9.0.1.1.5.".>.<.W.R.I.T.E.R._.C.O.M.P.O.N.E.N.T.S. .i.n.s.t.a.n.c.e.I.d.=.".d.a.8.6.8.4.4.e.-.5.b.2.9.-.4.d.2.8.-.a.e.8.d.-.a.8.6.1.2.0.f.3.8.a.4.4.". .w.r.i.t.e.r.I.d.=.".a.f.b.a.b.4.a.2.-.3.6.7.d.-.4.d.1.5.-.a.5.8.6.-.7.1.d.b.b.1.8.f.8.4.8.5.". .b.a.c.k.u.p.S.c.h.e.m.a.=.".0.".>.<.C.O.M.P.O.N.E.N.T. .c.o.m.p.o.n.e.n.t.N.a.m.e.=.".R.e.g.i.s.t.r.y.". .c.o.m.p.o.n.e.n.t.T.y.p.e.=.".f.i.l.e.g.r.o.u.p."./.>.<./.W.R.I.T.E.R._.C.O.M.P.O.N.E.N.T.S.>.<.W.R.I.T.E.R._.C.O.M.P.O.N.E.N.T.S. .i.n.s.t.a.
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):3048
                                                                                Entropy (8bit):3.669078455925044
                                                                                Encrypted:false
                                                                                SSDEEP:48:qDGv+6N38RN3xp/7wP8c1SFjwL7feGp9bHfOIgbR1fOIgBKEBKRC6v6Rey8H:qDGvJ4PUiF8fHzbOHXOHB9BpiV
                                                                                MD5:75CDF3F1112E5F9922F9E1CC3A34E72D
                                                                                SHA1:26DFEE703703EB5DCA338D58B04FC42579AEF31B
                                                                                SHA-256:BBD26345804B58BE3F41323421CB492DA1426253CD82DD8EB82C916889CF0690
                                                                                SHA-512:AF42CC8A966E750F1F45B797A68B6DAE1B7E48B3EDC3AEC7CCCB58E7A13856642D7C2CDBFAEEA3B17E0788819C7EE94F6D6E8B47B5AE4D93AE17E7827BDE6BA9
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:.D.....M..,....c...6.....................xA..yJL.N..T...9.........z............M..0.<fK...; ...............................$.......8...............I.n.s.t.a.l.l.e.d. .3.6.0. .T.o.t.a.l...............C.:.\.W.i.n.d.o.w.s.\...............3.0.2.4.9.4.................W.O.R.K.G.R.O.U.P.........A.'.3C..wZ......................).(?..P............. ...2.......2...\.\.?.\.V.o.l.u.m.e.{.8.0.4.9.f.1.9.8.-.1.0.1.6.-.1.1.e.7.-.b.8.7.b.-.8.0.6.e.6.f.6.e.6.9.6.3.}.\...............C.:.\...........N).A.j..j...............(...0.......,...2.......2...\.\.?.\.V.o.l.u.m.e.{.8.0.4.9.f.1.9.8.-.1.0.1.6.-.1.1.e.7.-.b.8.7.b.-.8.0.6.e.6.f.6.e.6.9.6.3.}.\.......4...............(.C.:.).........<...@...D...H...L...P...T...X...\...`...d...h...l...p...t...x...|...........%.......%...A.d.o.b.e. .A.c.r.o.b.a.t. .R.e.a.d.e.r. .D.C. .1.9...0.1.0...2.0.0.9.8.....).......)...A.d.o.b.e. .F.l.a.s.h. .P.l.a.y.e.r. .2.5. .A.c.t.i.v.e.X. .2.5...0...0...1.2.7.....'.......'...A.d.o.b.e. .F.l.a.s.h. .P.l.a.y.e.r. .2.5. .N.P.A.P.
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Unicode text, UTF-16, little-endian text, with very long lines (346), with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):934
                                                                                Entropy (8bit):3.522851285172858
                                                                                Encrypted:false
                                                                                SSDEEP:24:Q+W9OOkfIS3nMClWYsRO5nMClqDI+CVQlnqmmjFZ:7Wor3IpROJBRQlqmmH
                                                                                MD5:F5D67B0709309FC672AE4032CE057E00
                                                                                SHA1:7F96BF7FC81731C786322DFB063236A22CBFCE40
                                                                                SHA-256:02400657525EAA2D3ACF866D7B91AE651AEA730D326CD4327611386F2DF77ADA
                                                                                SHA-512:F6EF1B83C34C2BDA5884C55110D5920CAA5CDCAAD3EA0B2E268C2F37069288E553E4CF75440ADA200E35D8BF217F788F1B131F7F99939FCDADAD9CDFB7AEE0D9
                                                                                Malicious:false
                                                                                Preview:..E.r.r.o.r. .2.8.0.3... .D.i.a.l.o.g. .V.i.e.w. .d.i.d. .n.o.t. .f.i.n.d. .a. .r.e.c.o.r.d. .f.o.r. .t.h.e. .d.i.a.l.o.g. .E.r.r.o.r.D.l.g.......E.r.r.o.r. .1.7.2.2... .T.h.e.r.e. .i.s. .a. .p.r.o.b.l.e.m. .w.i.t.h. .t.h.i.s. .W.i.n.d.o.w.s. .I.n.s.t.a.l.l.e.r. .p.a.c.k.a.g.e... .A. .p.r.o.g.r.a.m. .r.u.n. .a.s. .p.a.r.t. .o.f. .t.h.e. .s.e.t.u.p. .d.i.d. .n.o.t. .f.i.n.i.s.h. .a.s. .e.x.p.e.c.t.e.d... .C.o.n.t.a.c.t. .y.o.u.r. .s.u.p.p.o.r.t. .p.e.r.s.o.n.n.e.l. .o.r. .p.a.c.k.a.g.e. .v.e.n.d.o.r... . .A.c.t.i.o.n. .L.a.u.n.c.h.F.i.l.e.,. .l.o.c.a.t.i.o.n.:. .C.:.\.W.i.n.d.o.w.s.\.I.n.s.t.a.l.l.e.r.\.M.S.I.1.B.4.2...t.m.p.,. .c.o.m.m.a.n.d.:. .C.:./.W.i.n.d.o.w.s./.S.y.s.t.e.m.3.2./.r.u.n.d.l.l.3.2...e.x.e. .C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.s.h.a.r.e.p.o.i.n.t.\.3.6.0.t.o.t.a.l...d.l.l.,. .h.o.m.q. .....=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .4./.2.6./.2.0.2.4. . .1.9.:.2.9.:.4.8. .=.=.=.....
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):446944
                                                                                Entropy (8bit):6.403916470886214
                                                                                Encrypted:false
                                                                                SSDEEP:6144:5x0A4eCDsgvSd7ftYx5fnLHT7ybjfgaUFfQiAOuv2IaZeB+:5x0ECIgYOx5fnL/tYi8OBZr
                                                                                MD5:475D20C0EA477A35660E3F67ECF0A1DF
                                                                                SHA1:67340739F51E1134AE8F0FFC5AE9DD710E8E3A08
                                                                                SHA-256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
                                                                                SHA-512:99525AAAB2AB608134B5D66B5313E7FC3C2E2877395C5C171897D7A6C66EFB26B606DE1A4CB01118C2738EA4B6542E4EB4983E631231B3F340BF85E509A9589E
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Joe Sandbox View:
                                                                                • Filename: ad.msi, Detection: malicious, Browse
                                                                                • Filename: Document_a19_79b555791-28h97348k5477-3219g9.js, Detection: malicious, Browse
                                                                                • Filename: ad.msi, Detection: malicious, Browse
                                                                                • Filename: avp.msi, Detection: malicious, Browse
                                                                                • Filename: Cheater Pro 1.6.0.msi, Detection: malicious, Browse
                                                                                • Filename: Cheat Lab 2.7.2.msi, Detection: malicious, Browse
                                                                                • Filename: payload.js, Detection: malicious, Browse
                                                                                • Filename: payload.js, Detection: malicious, Browse
                                                                                • Filename: Doc_m42_81h118103-88o62135w8623-1999q9.js, Detection: malicious, Browse
                                                                                • Filename: avp.msi, Detection: malicious, Browse
                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........0...c...c...c...b...c...bZ..c...b...c...b...c...b...c...b...c...b...c...b...c...c...cF..b...cF..b...cF..c...c..{c...cF..b...cRich...c........................PE..L....;.a.........."!.....t...P......'.....................................................@.........................PK......$S..........0........................L......p...............................@...............4............................text....r.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B........................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):446944
                                                                                Entropy (8bit):6.403916470886214
                                                                                Encrypted:false
                                                                                SSDEEP:6144:5x0A4eCDsgvSd7ftYx5fnLHT7ybjfgaUFfQiAOuv2IaZeB+:5x0ECIgYOx5fnL/tYi8OBZr
                                                                                MD5:475D20C0EA477A35660E3F67ECF0A1DF
                                                                                SHA1:67340739F51E1134AE8F0FFC5AE9DD710E8E3A08
                                                                                SHA-256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
                                                                                SHA-512:99525AAAB2AB608134B5D66B5313E7FC3C2E2877395C5C171897D7A6C66EFB26B606DE1A4CB01118C2738EA4B6542E4EB4983E631231B3F340BF85E509A9589E
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Joe Sandbox View:
                                                                                • Filename: ad.msi, Detection: malicious, Browse
                                                                                • Filename: Document_a19_79b555791-28h97348k5477-3219g9.js, Detection: malicious, Browse
                                                                                • Filename: ad.msi, Detection: malicious, Browse
                                                                                • Filename: avp.msi, Detection: malicious, Browse
                                                                                • Filename: Cheater Pro 1.6.0.msi, Detection: malicious, Browse
                                                                                • Filename: Cheat Lab 2.7.2.msi, Detection: malicious, Browse
                                                                                • Filename: payload.js, Detection: malicious, Browse
                                                                                • Filename: payload.js, Detection: malicious, Browse
                                                                                • Filename: Doc_m42_81h118103-88o62135w8623-1999q9.js, Detection: malicious, Browse
                                                                                • Filename: avp.msi, Detection: malicious, Browse
                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........0...c...c...c...b...c...bZ..c...b...c...b...c...b...c...b...c...b...c...b...c...c...cF..b...cF..b...cF..c...c..{c...cF..b...cRich...c........................PE..L....;.a.........."!.....t...P......'.....................................................@.........................PK......$S..........0........................L......p...............................@...............4............................text....r.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B........................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):446944
                                                                                Entropy (8bit):6.403916470886214
                                                                                Encrypted:false
                                                                                SSDEEP:6144:5x0A4eCDsgvSd7ftYx5fnLHT7ybjfgaUFfQiAOuv2IaZeB+:5x0ECIgYOx5fnL/tYi8OBZr
                                                                                MD5:475D20C0EA477A35660E3F67ECF0A1DF
                                                                                SHA1:67340739F51E1134AE8F0FFC5AE9DD710E8E3A08
                                                                                SHA-256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
                                                                                SHA-512:99525AAAB2AB608134B5D66B5313E7FC3C2E2877395C5C171897D7A6C66EFB26B606DE1A4CB01118C2738EA4B6542E4EB4983E631231B3F340BF85E509A9589E
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........0...c...c...c...b...c...bZ..c...b...c...b...c...b...c...b...c...b...c...b...c...c...cF..b...cF..b...cF..c...c..{c...cF..b...cRich...c........................PE..L....;.a.........."!.....t...P......'.....................................................@.........................PK......$S..........0........................L......p...............................@...............4............................text....r.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B........................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):446944
                                                                                Entropy (8bit):6.403916470886214
                                                                                Encrypted:false
                                                                                SSDEEP:6144:5x0A4eCDsgvSd7ftYx5fnLHT7ybjfgaUFfQiAOuv2IaZeB+:5x0ECIgYOx5fnL/tYi8OBZr
                                                                                MD5:475D20C0EA477A35660E3F67ECF0A1DF
                                                                                SHA1:67340739F51E1134AE8F0FFC5AE9DD710E8E3A08
                                                                                SHA-256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
                                                                                SHA-512:99525AAAB2AB608134B5D66B5313E7FC3C2E2877395C5C171897D7A6C66EFB26B606DE1A4CB01118C2738EA4B6542E4EB4983E631231B3F340BF85E509A9589E
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........0...c...c...c...b...c...bZ..c...b...c...b...c...b...c...b...c...b...c...b...c...c...cF..b...cF..b...cF..c...c..{c...cF..b...cRich...c........................PE..L....;.a.........."!.....t...P......'.....................................................@.........................PK......$S..........0........................L......p...............................@...............4............................text....r.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B........................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):446944
                                                                                Entropy (8bit):6.403916470886214
                                                                                Encrypted:false
                                                                                SSDEEP:6144:5x0A4eCDsgvSd7ftYx5fnLHT7ybjfgaUFfQiAOuv2IaZeB+:5x0ECIgYOx5fnL/tYi8OBZr
                                                                                MD5:475D20C0EA477A35660E3F67ECF0A1DF
                                                                                SHA1:67340739F51E1134AE8F0FFC5AE9DD710E8E3A08
                                                                                SHA-256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
                                                                                SHA-512:99525AAAB2AB608134B5D66B5313E7FC3C2E2877395C5C171897D7A6C66EFB26B606DE1A4CB01118C2738EA4B6542E4EB4983E631231B3F340BF85E509A9589E
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........0...c...c...c...b...c...bZ..c...b...c...b...c...b...c...b...c...b...c...b...c...c...cF..b...cF..b...cF..c...c..{c...cF..b...cRich...c........................PE..L....;.a.........."!.....t...P......'.....................................................@.........................PK......$S..........0........................L......p...............................@...............4............................text....r.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B........................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):512
                                                                                Entropy (8bit):0.0
                                                                                Encrypted:false
                                                                                SSDEEP:3::
                                                                                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                Malicious:false
                                                                                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):73728
                                                                                Entropy (8bit):0.1434969816921214
                                                                                Encrypted:false
                                                                                SSDEEP:24:vOsTxtqEsipVtqE+tqEsipVtqEgVAEVtqyjCycVIwGuKO2BLBB+WY:2sTuSjSiVAEjCycf2BLBBG
                                                                                MD5:230E0E4EC375BB7B60D47E0B783A3C60
                                                                                SHA1:F80D7CCC6D6822E765BEE7159CD8F9917724DF7C
                                                                                SHA-256:256B5CAF68651A065FA4EC99D80F0045FA374CAB9EC7309C864527D4C3CDA474
                                                                                SHA-512:5B8FBEA097E4C42FFCA62744959545E3E9F6789EA1C6546F063AD95C8CB1E2476D77F3138F3A210C1C440CCB49DE2314B24AF9276C5F56EB05D2703B31D5045A
                                                                                Malicious:false
                                                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):32768
                                                                                Entropy (8bit):0.06865124144599899
                                                                                Encrypted:false
                                                                                SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOFK0TlHXLboX/st6Vky6lZ:2F0i8n0itFzDHFFKsqX/2Z
                                                                                MD5:F164F17683B82A5A48D60CB5420CE46B
                                                                                SHA1:8613E8F06FAFFA42E1929EEC4260DB25523DFD5D
                                                                                SHA-256:C54B7BE1C2C71FF44223F7FEABB7C293B20F2BA48D02D2AF9685FB143EE7A5B4
                                                                                SHA-512:D492CF172EF702B16E66B6E372948446DD43B1741A5001C357FAB797EED6103D51D78C58056485E5E9E4B2C2E9A86451884CA42EB86C70B365799889071813B2
                                                                                Malicious:false
                                                                                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):906752
                                                                                Entropy (8bit):6.271226161679794
                                                                                Encrypted:false
                                                                                SSDEEP:12288:WfPSAAUHV4fZUv/TrguVTax7hNRu18VAyJFoxMk/wYeDKDMyPDi:MPSAAUHV4fZUvfgmaxpu1FyJ6xMYHMke
                                                                                MD5:BD3A3714EE9A071EBEB59AC91D9EBB5A
                                                                                SHA1:55110A221F20A4CEEC34C58D0179FA31F8C102E9
                                                                                SHA-256:4CF2B612939359977DF51A32D2F63E2CB0C6C601E114B8E4812BD548D1DB85FE
                                                                                SHA-512:7244220F29057339C99A22C20268187BA6F6681251F4CE4F305AD22DC030F6078B4F298EF10AD392DC5D036C41C7B8C28C2BD997EA39EF7AB023CB9B5C946DC8
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: Virustotal, Detection: 10%, Browse
                                                                                Preview:MZ......................@...................................h...........!..L.!This program cannot be run in DOS mode....$........,>5.MPf.MPf.MPf.<Qg.MPf..Qg.MPf.%Tg.MPf.%Sg.MPf.&Ug.MPf-$Qg.MPf.<Ug.MPf.<Ug.MPf+.f.MPf/$Tg.MPf.*Ug.MPf.*Tg.MPf/$Ug.MPf.$Ug.MPf.%Ug.MPf.&Tg.MPf.&Vg.MPf.&Qg.MPf.MQfoLPf.$Yg.MPf.$Pg.MPf.$.f.MPf.M.f.MPf.$Rg.MPfRich.MPf................PE..d...:5.`..........# .....J..........`........................................@............ ..........................................+......`,..,....0...........d......H?...@..........T.......................(....................`...............................text...(I.......J.................. ..`.rdata.......`.......N..............@..@.data....e...P...0...<..............@....pdata...d.......f...l..............@..@.rsrc........0......................@..@.reloc.......@......................@..Bwsgi2........P.........................@..........!1)FX?@T#s9Cey$lE<HI0x&%czAYeH9a))*C9%fd8%Z<@zCvcK....................................
                                                                                Process:C:\Windows\System32\rundll32.exe
                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):906752
                                                                                Entropy (8bit):6.271226161679794
                                                                                Encrypted:false
                                                                                SSDEEP:12288:WfPSAAUHV4fZUv/TrguVTax7hNRu18VAyJFoxMk/wYeDKDMyPDi:MPSAAUHV4fZUvfgmaxpu1FyJ6xMYHMke
                                                                                MD5:BD3A3714EE9A071EBEB59AC91D9EBB5A
                                                                                SHA1:55110A221F20A4CEEC34C58D0179FA31F8C102E9
                                                                                SHA-256:4CF2B612939359977DF51A32D2F63E2CB0C6C601E114B8E4812BD548D1DB85FE
                                                                                SHA-512:7244220F29057339C99A22C20268187BA6F6681251F4CE4F305AD22DC030F6078B4F298EF10AD392DC5D036C41C7B8C28C2BD997EA39EF7AB023CB9B5C946DC8
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: Virustotal, Detection: 10%, Browse
                                                                                Preview:MZ......................@...................................h...........!..L.!This program cannot be run in DOS mode....$........,>5.MPf.MPf.MPf.<Qg.MPf..Qg.MPf.%Tg.MPf.%Sg.MPf.&Ug.MPf-$Qg.MPf.<Ug.MPf.<Ug.MPf+.f.MPf/$Tg.MPf.*Ug.MPf.*Tg.MPf/$Ug.MPf.$Ug.MPf.%Ug.MPf.&Tg.MPf.&Vg.MPf.&Qg.MPf.MQfoLPf.$Yg.MPf.$Pg.MPf.$.f.MPf.M.f.MPf.$Rg.MPfRich.MPf................PE..d...:5.`..........# .....J..........`........................................@............ ..........................................+......`,..,....0...........d......H?...@..........T.......................(....................`...............................text...(I.......J.................. ..`.rdata.......`.......N..............@..@.data....e...P...0...<..............@....pdata...d.......f...l..............@..@.rsrc........0......................@..@.reloc.......@......................@..Bwsgi2........P.........................@..........!1)FX?@T#s9Cey$lE<HI0x&%czAYeH9a))*C9%fd8%Z<@zCvcK....................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {6C81CEE0-3161-4D91-A688-254B67D7D838}, Number of Words: 10, Subject: 360 Total, Author: HuMaster LLC, Name of Creating Application: 360 Total, Template: ;1033, Comments: This installer database contains the logic and data required to install 360 Total., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
                                                                                Category:dropped
                                                                                Size (bytes):1620480
                                                                                Entropy (8bit):7.153702346443201
                                                                                Encrypted:false
                                                                                SSDEEP:49152:JZH3YuW8zBQSc0ZnSKmZKumZr7AQB7aLTB:7Y90Zn0K/AQwLF
                                                                                MD5:37605A3EB80F3366E56938031A9AC917
                                                                                SHA1:0582A0DD69D6027FB94765254ED91AD736ADE305
                                                                                SHA-256:4E7AC0BDB516E983B3CAB7F79850D8102D2BF4117BB343B68D0DA73780CCEB1A
                                                                                SHA-512:772BB5538F5AF14146D9BCF8D8C29A70860ECDF84B4AF6CC99DAE7589F60847CA7CB87B068BD2AA86F620E79D394C223B96C9FE95FE390E8A9C8422282F5B405
                                                                                Malicious:false
                                                                                Preview:......................>.......................................................E.......a...............................(...)...*...+...,...-...........A...B...C...D...E...F...............................................................................................................................................................................................................................................................................................................................................................;...........!...3............................................................................................... ...+..."...#...$...%...&...'...(...)...*...1...,...-......./...0...4...2...:...?...5...6...7...8...9...>...<.......=...........@...A...B...C...D...........G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                                Category:dropped
                                                                                Size (bytes):20480
                                                                                Entropy (8bit):1.6038146071945973
                                                                                Encrypted:false
                                                                                SSDEEP:48:g80ccDH0luWqw1LCSiVAEjCycf27SOT5:g8RUDNZeQCG/
                                                                                MD5:D19184246803D4518495AFE1200E4D6E
                                                                                SHA1:BB4710FDC5C8D656893FE569550D9DF9FF35C2CA
                                                                                SHA-256:72ECA19ACA5A7F267EA3F700702590CEDB7288B075D227082791FDE26A877D60
                                                                                SHA-512:1C83C6A6013D85111F9AD4DEC5762E4282A5164040BB86329B36D0F015393058B7DC1D9C2EAEF09468F80D6B82BCE091AA2B27605CAC01D1077C12AAB3987496
                                                                                Malicious:false
                                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):401012
                                                                                Entropy (8bit):6.591583801241678
                                                                                Encrypted:false
                                                                                SSDEEP:6144:cMvZx0Flyv/UB8zBQSnuJnO6n4ZSaHwLvFnNLqrFWeyp1uBxfAOT3VDqO1O:cMvZx0FlS68zBQSncb4ZPQTpAjZxqO1O
                                                                                MD5:2CA1525269AABDEC54BBE29C75CA2C9C
                                                                                SHA1:71C6FDD065A92B32CA27A3D839521D3F4667E2F4
                                                                                SHA-256:E8DCBD749DBB471272C4555235E6923B946D93FF957800C64A53C8A6399300C4
                                                                                SHA-512:15CAAC4A58C2CE994B016D207FB4313A63BC6EB3A5F2836315A9E95AC5A559E53B18769746117BA6E17ABC58C44697C10BD4B9956BE832B9CC59E07C982303D5
                                                                                Malicious:false
                                                                                Preview:...@IXOS.@.....@...X.@.....@.....@.....@.....@.....@......&.{B135729E-0574-44D1-B7A1-6E44550F506B}..360 Total..neo.msi.@.....@.....@.....@........&.{6C81CEE0-3161-4D91-A688-254B67D7D838}.....@.....@.....@.....@.......@.....@.....@.......@......360 Total......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration...@.....@.....@.]....&.{B48CC27C-9823-4256-8235-834BFD2D0DBB}6.C:\Users\user\AppData\Roaming\HuMaster LLC\360 Total\.@.......@.....@.....@......&.{4A323D5F-6D73-4C26-8E39-BE8928DA13EB}+.01:\Software\HuMaster LLC\360 Total\Version.@.......@.....@.....@......&.{ADF9F598-7B84-45C9-B1CA-E80968A538BA}4.C:\Users\user\AppData\Local\sharepoint\360total.dll.@.......@.....@.....@........CreateFolders..Creating folders..Folder: [1]".6.C:\Users\user\AppData\Roaming\HuMaster LLC\360 Total\.@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]...@.....@.....@......
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):399328
                                                                                Entropy (8bit):6.589290025452677
                                                                                Encrypted:false
                                                                                SSDEEP:6144:gMvZx0Flyv/UB8zBQSnuJnO6n4ZSaHwLvFnNLqrFWeyp1uBxfAOT3VDqO1:gMvZx0FlS68zBQSncb4ZPQTpAjZxqO1
                                                                                MD5:B9545ED17695A32FACE8C3408A6A3553
                                                                                SHA1:F6C31C9CD832AE2AEBCD88E7B2FA6803AE93FC83
                                                                                SHA-256:1E0E63B446EECF6C9781C7D1CAE1F46A3BB31654A70612F71F31538FB4F4729A
                                                                                SHA-512:F6D6DC40DCBA5FF091452D7CC257427DCB7CE2A21816B4FEC2EE249E63246B64667F5C4095220623533243103876433EF8C12C9B612C0E95FDFFFE41D1504E04
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................J......J..5.......................J......J......J..........Y..."......".q............."......Rich....................PE..L....<.a.........."......^...........2.......p....@..........................P......".....@.................................0....................................5...V..p....................X.......W..@............p.. ............................text....\.......^.................. ..`.rdata..XA...p...B...b..............@..@.data....6..........................@....rsrc...............................@..@.reloc...5.......6..................@..B........................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):446944
                                                                                Entropy (8bit):6.403916470886214
                                                                                Encrypted:false
                                                                                SSDEEP:6144:5x0A4eCDsgvSd7ftYx5fnLHT7ybjfgaUFfQiAOuv2IaZeB+:5x0ECIgYOx5fnL/tYi8OBZr
                                                                                MD5:475D20C0EA477A35660E3F67ECF0A1DF
                                                                                SHA1:67340739F51E1134AE8F0FFC5AE9DD710E8E3A08
                                                                                SHA-256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
                                                                                SHA-512:99525AAAB2AB608134B5D66B5313E7FC3C2E2877395C5C171897D7A6C66EFB26B606DE1A4CB01118C2738EA4B6542E4EB4983E631231B3F340BF85E509A9589E
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........0...c...c...c...b...c...bZ..c...b...c...b...c...b...c...b...c...b...c...b...c...c...cF..b...cF..b...cF..c...c..{c...cF..b...cRich...c........................PE..L....;.a.........."!.....t...P......'.....................................................@.........................PK......$S..........0........................L......p...............................@...............4............................text....r.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B........................................................................................................................................................................................................................................................................
                                                                                Process:C:\Windows\System32\msiexec.exe
                                                                                File Type:Composite Document File V2 Document, Cannot read section info
                                                                                Category:dropped
                                                                                Size (bytes):20480
                                                                                Entropy (8bit):1.1618073920076895
                                                                                Encrypted:false
                                                                                SSDEEP:12:JSbX72FjQiAGiLIlHVRpqh/7777777777777777777777777vDHFFKsqX/DpZl0G:J5QI56foeF
                                                                                MD5:AB251117F6DE2E0E2F3E42A8A6C8CD4E
                                                                                SHA1:67C3E4AFC3E1FBBB311C66CA729F8878ECE2F87A
                                                                                SHA-256:A6673048BBC5DAD8F2905310E97D31ECB97A3DD60FA4DD526AA773BCE2B4A446
                                                                                SHA-512:0BC9A2F72AC358261F5955E70962154FA999BF8BC900A9CE58A232080EE5DDF2CC3761CDBDE19A4A0D8D7EBE70BED34D31193FCD762A1120D26BAE4EFDC3A7CA
                                                                                Malicious:false
                                                                                Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {6C81CEE0-3161-4D91-A688-254B67D7D838}, Number of Words: 10, Subject: 360 Total, Author: HuMaster LLC, Name of Creating Application: 360 Total, Template: ;1033, Comments: This installer database contains the logic and data required to install 360 Total., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
                                                                                Entropy (8bit):7.153702346443201
                                                                                TrID:
                                                                                • Windows SDK Setup Transform Script (63028/2) 47.91%
                                                                                • Microsoft Windows Installer (60509/1) 46.00%
                                                                                • Generic OLE2 / Multistream Compound File (8008/1) 6.09%
                                                                                File name:neo.msi
                                                                                File size:1'620'480 bytes
                                                                                MD5:37605a3eb80f3366e56938031a9ac917
                                                                                SHA1:0582a0dd69d6027fb94765254ed91ad736ade305
                                                                                SHA256:4e7ac0bdb516e983b3cab7f79850d8102d2bf4117bb343b68d0da73780cceb1a
                                                                                SHA512:772bb5538f5af14146d9bcf8d8c29a70860ecdf84b4af6cc99dae7589f60847ca7cb87b068bd2aa86f620e79d394c223b96c9fe95fe390e8a9c8422282f5b405
                                                                                SSDEEP:49152:JZH3YuW8zBQSc0ZnSKmZKumZr7AQB7aLTB:7Y90Zn0K/AQwLF
                                                                                TLSH:6175D0227386C537C96E01303A19D66B5179FDB74B3140DBA3C8292E9EB45C1A739FA3
                                                                                File Content Preview:........................>.......................................................E.......a...............................(...)...*...+...,...-...........A...B...C...D...E...F..................................................................................
                                                                                Icon Hash:2d2e3797b32b2b99
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Apr 26, 2024 19:27:00.940279961 CEST5482153192.168.2.228.8.8.8
                                                                                Apr 26, 2024 19:27:01.125499964 CEST53548218.8.8.8192.168.2.22
                                                                                Apr 26, 2024 19:27:01.136775970 CEST5482153192.168.2.228.8.8.8
                                                                                Apr 26, 2024 19:27:01.335549116 CEST53548218.8.8.8192.168.2.22
                                                                                Apr 26, 2024 19:27:01.335982084 CEST5482153192.168.2.228.8.8.8
                                                                                Apr 26, 2024 19:27:01.506666899 CEST53548218.8.8.8192.168.2.22
                                                                                Apr 26, 2024 19:27:01.506907940 CEST5482153192.168.2.228.8.8.8
                                                                                Apr 26, 2024 19:27:01.677035093 CEST53548218.8.8.8192.168.2.22
                                                                                Apr 26, 2024 19:27:01.680134058 CEST5482153192.168.2.228.8.8.8
                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                Apr 26, 2024 19:27:00.940279961 CEST192.168.2.228.8.8.80xa11aStandard query (0)jarinamaers.shopA (IP address)IN (0x0001)false
                                                                                Apr 26, 2024 19:27:01.136775970 CEST192.168.2.228.8.8.80xa11aStandard query (0)jarinamaers.shopA (IP address)IN (0x0001)false
                                                                                Apr 26, 2024 19:27:01.335982084 CEST192.168.2.228.8.8.80xa11aStandard query (0)jarinamaers.shopA (IP address)IN (0x0001)false
                                                                                Apr 26, 2024 19:27:01.506907940 CEST192.168.2.228.8.8.80xa11aStandard query (0)jarinamaers.shopA (IP address)IN (0x0001)false
                                                                                Apr 26, 2024 19:27:01.680134058 CEST192.168.2.228.8.8.80xa11aStandard query (0)jarinamaers.shopA (IP address)IN (0x0001)false
                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                Apr 26, 2024 19:27:01.125499964 CEST8.8.8.8192.168.2.220xa11aNo error (0)jarinamaers.shop104.21.46.75A (IP address)IN (0x0001)false
                                                                                Apr 26, 2024 19:27:01.125499964 CEST8.8.8.8192.168.2.220xa11aNo error (0)jarinamaers.shop172.67.136.103A (IP address)IN (0x0001)false
                                                                                Apr 26, 2024 19:27:01.335549116 CEST8.8.8.8192.168.2.220xa11aNo error (0)jarinamaers.shop104.21.46.75A (IP address)IN (0x0001)false
                                                                                Apr 26, 2024 19:27:01.335549116 CEST8.8.8.8192.168.2.220xa11aNo error (0)jarinamaers.shop172.67.136.103A (IP address)IN (0x0001)false
                                                                                Apr 26, 2024 19:27:01.506666899 CEST8.8.8.8192.168.2.220xa11aNo error (0)jarinamaers.shop104.21.46.75A (IP address)IN (0x0001)false
                                                                                Apr 26, 2024 19:27:01.506666899 CEST8.8.8.8192.168.2.220xa11aNo error (0)jarinamaers.shop172.67.136.103A (IP address)IN (0x0001)false
                                                                                Apr 26, 2024 19:27:01.677035093 CEST8.8.8.8192.168.2.220xa11aNo error (0)jarinamaers.shop104.21.46.75A (IP address)IN (0x0001)false
                                                                                Apr 26, 2024 19:27:01.677035093 CEST8.8.8.8192.168.2.220xa11aNo error (0)jarinamaers.shop172.67.136.103A (IP address)IN (0x0001)false

                                                                                Click to jump to process

                                                                                Click to jump to process

                                                                                Click to dive into process behavior distribution

                                                                                Click to jump to process

                                                                                Target ID:0
                                                                                Start time:19:24:56
                                                                                Start date:26/04/2024
                                                                                Path:C:\Windows\System32\msiexec.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\neo.msi"
                                                                                Imagebase:0xff9d0000
                                                                                File size:128'512 bytes
                                                                                MD5 hash:AC2E7152124CEED36846BD1B6592A00F
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:moderate
                                                                                Has exited:true

                                                                                Target ID:1
                                                                                Start time:19:24:56
                                                                                Start date:26/04/2024
                                                                                Path:C:\Windows\System32\msiexec.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\msiexec.exe /V
                                                                                Imagebase:0xff9d0000
                                                                                File size:128'512 bytes
                                                                                MD5 hash:AC2E7152124CEED36846BD1B6592A00F
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:moderate
                                                                                Has exited:false

                                                                                Target ID:3
                                                                                Start time:19:24:56
                                                                                Start date:26/04/2024
                                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 274E0059499F24D0FC6E34D9DC99A829 C
                                                                                Imagebase:0x2d0000
                                                                                File size:73'216 bytes
                                                                                MD5 hash:4315D6ECAE85024A0567DF2CB253B7B0
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:moderate
                                                                                Has exited:true

                                                                                Target ID:6
                                                                                Start time:19:25:10
                                                                                Start date:26/04/2024
                                                                                Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 5FD089C2C199466E3D17DC881ED4AD10
                                                                                Imagebase:0x2d0000
                                                                                File size:73'216 bytes
                                                                                MD5 hash:4315D6ECAE85024A0567DF2CB253B7B0
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:moderate
                                                                                Has exited:true

                                                                                Target ID:7
                                                                                Start time:19:25:20
                                                                                Start date:26/04/2024
                                                                                Path:C:\Windows\Installer\MSI1B42.tmp
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Windows\Installer\MSI1B42.tmp" C:/Windows/System32/rundll32.exe C:\Users\user\AppData\Local\sharepoint\360total.dll, homq
                                                                                Imagebase:0xd10000
                                                                                File size:399'328 bytes
                                                                                MD5 hash:B9545ED17695A32FACE8C3408A6A3553
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Antivirus matches:
                                                                                • Detection: 0%, ReversingLabs
                                                                                • Detection: 0%, Virustotal, Browse
                                                                                Reputation:moderate
                                                                                Has exited:true

                                                                                Target ID:8
                                                                                Start time:19:25:21
                                                                                Start date:26/04/2024
                                                                                Path:C:\Windows\System32\rundll32.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Local\sharepoint\360total.dll, homq
                                                                                Imagebase:0xffa40000
                                                                                File size:45'568 bytes
                                                                                MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000008.00000002.446771476.00000000000A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:9
                                                                                Start time:19:25:21
                                                                                Start date:26/04/2024
                                                                                Path:C:\Windows\System32\rundll32.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_6a61d649.dll", homq
                                                                                Imagebase:0xffa40000
                                                                                File size:45'568 bytes
                                                                                MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000009.00000003.614395824.0000000000470000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000009.00000002.619163772.0000000001E80000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000009.00000002.619168848.0000000001F0A000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000009.00000002.618961213.0000000000110000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 00000009.00000002.619007012.00000000001C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Target ID:11
                                                                                Start time:19:25:25
                                                                                Start date:26/04/2024
                                                                                Path:C:\Windows\System32\taskeng.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:taskeng.exe {9EB3A60F-302F-4AB2-B149-897715BB8B05} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
                                                                                Imagebase:0xff6a0000
                                                                                File size:464'384 bytes
                                                                                MD5 hash:65EA57712340C09B1B0C427B4848AE05
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Target ID:13
                                                                                Start time:19:25:28
                                                                                Start date:26/04/2024
                                                                                Path:C:\Windows\System32\rundll32.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_6a61d649.dll", homq
                                                                                Imagebase:0xffa40000
                                                                                File size:45'568 bytes
                                                                                MD5 hash:DD81D91FF3B0763C392422865C9AC12E
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 0000000D.00000002.420736655.00000000002A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Latrodectus, Description: Yara detected Latrodectus, Source: 0000000D.00000002.420775529.0000000001AD0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Reset < >

                                                                                  Execution Graph

                                                                                  Execution Coverage:4.4%
                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                  Signature Coverage:15.9%
                                                                                  Total number of Nodes:1178
                                                                                  Total number of Limit Nodes:20
                                                                                  execution_graph 33460 d33072 33465 d3353f SetUnhandledExceptionFilter 33460->33465 33462 d33077 33466 d4524c 41 API calls 2 library calls 33462->33466 33464 d33082 33465->33462 33466->33464 33467 d51b40 33470 d4b805 33467->33470 33471 d4b80e 33470->33471 33472 d4b840 33470->33472 33476 d45887 33471->33476 33477 d45892 33476->33477 33478 d45898 33476->33478 33524 d475d7 6 API calls std::_Lockit::_Lockit 33477->33524 33497 d4589e 33478->33497 33525 d47616 6 API calls std::_Lockit::_Lockit 33478->33525 33481 d458b2 33481->33497 33526 d470bb 33481->33526 33486 d458df 33535 d47616 6 API calls std::_Lockit::_Lockit 33486->33535 33487 d458ca 33533 d47616 6 API calls std::_Lockit::_Lockit 33487->33533 33490 d458eb 33491 d458fe 33490->33491 33492 d458ef 33490->33492 33537 d455fa 14 API calls _unexpected 33491->33537 33536 d47616 6 API calls std::_Lockit::_Lockit 33492->33536 33496 d45909 33538 d453b8 14 API calls 2 library calls 33496->33538 33500 d458a3 33497->33500 33539 d42a07 41 API calls __InternalCxxFrameHandler 33497->33539 33498 d458d6 33534 d453b8 14 API calls 2 library calls 33498->33534 33501 d4b610 33500->33501 33542 d4b765 33501->33542 33508 d4b66c 33578 d453b8 14 API calls 2 library calls 33508->33578 33509 d4b67a 33567 d4b860 33509->33567 33512 d4b653 33512->33472 33514 d4b6b2 33579 d37370 14 API calls __dosmaperr 33514->33579 33516 d4b6f9 33519 d4b742 33516->33519 33582 d4b282 41 API calls 2 library calls 33516->33582 33517 d4b6b7 33580 d453b8 14 API calls 2 library calls 33517->33580 33518 d4b6cd 33518->33516 33581 d453b8 14 API calls 2 library calls 33518->33581 33583 d453b8 14 API calls 2 library calls 33519->33583 33524->33478 33525->33481 33531 d470c8 std::_Locinfo::_W_Getmonths 33526->33531 33527 d47108 33541 d37370 14 API calls __dosmaperr 33527->33541 33528 d470f3 RtlAllocateHeap 33529 d458c2 33528->33529 33528->33531 33529->33486 33529->33487 33531->33527 33531->33528 33540 d4bf83 EnterCriticalSection LeaveCriticalSection std::_Locinfo::_W_Getmonths 33531->33540 33533->33498 33534->33497 33535->33490 33536->33498 33537->33496 33538->33500 33540->33531 33541->33529 33543 d4b771 CallCatchBlock 33542->33543 33545 d4b78b 33543->33545 33584 d41c9a EnterCriticalSection 33543->33584 33547 d4b63a 33545->33547 33587 d42a07 41 API calls __InternalCxxFrameHandler 33545->33587 33546 d4b7c7 33586 d4b7e4 LeaveCriticalSection std::_Lockit::~_Lockit 33546->33586 33553 d4b390 33547->33553 33550 d4b79b 33550->33546 33585 d453b8 14 API calls 2 library calls 33550->33585 33588 d37078 33553->33588 33556 d4b3b1 GetOEMCP 33559 d4b3da 33556->33559 33557 d4b3c3 33558 d4b3c8 GetACP 33557->33558 33557->33559 33558->33559 33559->33512 33560 d45bdc 33559->33560 33561 d45c1a 33560->33561 33565 d45bea std::_Locinfo::_W_Getmonths 33560->33565 33635 d37370 14 API calls __dosmaperr 33561->33635 33563 d45c05 RtlAllocateHeap 33564 d45c18 33563->33564 33563->33565 33564->33508 33564->33509 33565->33561 33565->33563 33634 d4bf83 EnterCriticalSection LeaveCriticalSection std::_Locinfo::_W_Getmonths 33565->33634 33568 d4b390 43 API calls 33567->33568 33569 d4b880 33568->33569 33571 d4b8bd IsValidCodePage 33569->33571 33575 d4b8f9 _Getvals 33569->33575 33573 d4b8cf 33571->33573 33571->33575 33572 d4b6a7 33572->33514 33572->33518 33574 d4b8fe GetCPInfo 33573->33574 33577 d4b8d8 _Getvals 33573->33577 33574->33575 33574->33577 33647 d32937 33575->33647 33636 d4b464 33577->33636 33578->33512 33579->33517 33580->33512 33581->33516 33582->33519 33583->33512 33584->33550 33585->33546 33586->33545 33589 d3708f 33588->33589 33590 d37096 33588->33590 33589->33556 33589->33557 33590->33589 33596 d457cc GetLastError 33590->33596 33594 d370cd 33624 d45b15 41 API calls __cftoe 33594->33624 33597 d457e2 33596->33597 33601 d457e8 33596->33601 33625 d475d7 6 API calls std::_Lockit::_Lockit 33597->33625 33600 d45804 33602 d470bb _unexpected 14 API calls 33600->33602 33621 d457ec SetLastError 33600->33621 33601->33621 33626 d47616 6 API calls std::_Lockit::_Lockit 33601->33626 33604 d45819 33602->33604 33607 d45821 33604->33607 33608 d45832 33604->33608 33605 d45881 33633 d42a07 41 API calls __InternalCxxFrameHandler 33605->33633 33606 d370b7 33623 d45ab7 41 API calls __Getcoll 33606->33623 33627 d47616 6 API calls std::_Lockit::_Lockit 33607->33627 33628 d47616 6 API calls std::_Lockit::_Lockit 33608->33628 33613 d4582f 33630 d453b8 14 API calls 2 library calls 33613->33630 33614 d4583e 33615 d45842 33614->33615 33616 d45859 33614->33616 33629 d47616 6 API calls std::_Lockit::_Lockit 33615->33629 33631 d455fa 14 API calls _unexpected 33616->33631 33620 d45864 33632 d453b8 14 API calls 2 library calls 33620->33632 33621->33605 33621->33606 33623->33594 33624->33589 33625->33601 33626->33600 33627->33613 33628->33614 33629->33613 33630->33621 33631->33620 33632->33621 33634->33565 33635->33564 33637 d4b48c GetCPInfo 33636->33637 33646 d4b555 33636->33646 33643 d4b4a4 33637->33643 33637->33646 33639 d32937 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 33641 d4b60e 33639->33641 33641->33575 33654 d4a836 33643->33654 33645 d46fa7 45 API calls 33645->33646 33646->33639 33648 d32940 IsProcessorFeaturePresent 33647->33648 33649 d3293f 33647->33649 33651 d329a5 33648->33651 33649->33572 33735 d32968 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 33651->33735 33653 d32a88 33653->33572 33655 d37078 __cftoe 41 API calls 33654->33655 33656 d4a856 33655->33656 33674 d4a93f 33656->33674 33658 d4a91a 33660 d32937 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 33658->33660 33659 d4a912 33677 d32326 14 API calls ~collate 33659->33677 33664 d4a93d 33660->33664 33661 d4a883 33661->33658 33661->33659 33663 d45bdc std::_Locinfo::_W_Getmonths 15 API calls 33661->33663 33665 d4a8a8 _Getvals __alloca_probe_16 33661->33665 33663->33665 33669 d46fa7 33664->33669 33665->33659 33666 d4a93f __cftoe MultiByteToWideChar 33665->33666 33667 d4a8f3 33666->33667 33667->33659 33668 d4a8fe GetStringTypeW 33667->33668 33668->33659 33670 d37078 __cftoe 41 API calls 33669->33670 33671 d46fba 33670->33671 33678 d46db9 33671->33678 33675 d4a950 MultiByteToWideChar 33674->33675 33675->33661 33677->33658 33679 d46dd4 __Strxfrm 33678->33679 33680 d4a93f __cftoe MultiByteToWideChar 33679->33680 33683 d46e1a 33680->33683 33681 d46f92 33682 d32937 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 33681->33682 33684 d46fa5 33682->33684 33683->33681 33685 d45bdc std::_Locinfo::_W_Getmonths 15 API calls 33683->33685 33687 d46e40 __alloca_probe_16 33683->33687 33698 d46ec6 33683->33698 33684->33645 33685->33687 33688 d4a93f __cftoe MultiByteToWideChar 33687->33688 33687->33698 33689 d46e85 33688->33689 33689->33698 33706 d47831 33689->33706 33692 d46eb7 33696 d47831 __cftoe 6 API calls 33692->33696 33692->33698 33693 d46eef 33694 d46f7a 33693->33694 33697 d45bdc std::_Locinfo::_W_Getmonths 15 API calls 33693->33697 33699 d46f01 __alloca_probe_16 33693->33699 33714 d32326 14 API calls ~collate 33694->33714 33696->33698 33697->33699 33715 d32326 14 API calls ~collate 33698->33715 33699->33694 33700 d47831 __cftoe 6 API calls 33699->33700 33701 d46f44 33700->33701 33701->33694 33712 d4a9bb WideCharToMultiByte 33701->33712 33703 d46f5e 33703->33694 33704 d46f67 33703->33704 33713 d32326 14 API calls ~collate 33704->33713 33716 d472c7 33706->33716 33709 d46ea7 33709->33692 33709->33693 33709->33698 33711 d47882 LCMapStringW 33711->33709 33712->33703 33713->33698 33714->33698 33715->33681 33720 d473c6 33716->33720 33719 d4788e 5 API calls __cftoe 33719->33711 33721 d473f4 33720->33721 33725 d472dd 33720->33725 33721->33725 33727 d472fb 33721->33727 33724 d4740e GetProcAddress 33724->33725 33726 d4741e std::_Lockit::_Lockit 33724->33726 33725->33709 33725->33719 33726->33725 33733 d4730c ___vcrt_FlsGetValue 33727->33733 33728 d473a2 33728->33724 33728->33725 33729 d4732a LoadLibraryExW 33730 d47345 GetLastError 33729->33730 33731 d473a9 33729->33731 33730->33733 33731->33728 33732 d473bb FreeLibrary 33731->33732 33732->33728 33733->33728 33733->33729 33734 d47378 LoadLibraryExW 33733->33734 33734->33731 33734->33733 33735->33653 33736 d33084 33737 d33090 CallCatchBlock 33736->33737 33762 d32de4 33737->33762 33739 d33097 33740 d331ea 33739->33740 33751 d330c1 ___scrt_is_nonwritable_in_current_image __InternalCxxFrameHandler ___scrt_release_startup_lock 33739->33751 33796 d333a8 4 API calls 2 library calls 33740->33796 33742 d331f1 33797 d42ed9 23 API calls __InternalCxxFrameHandler 33742->33797 33744 d331f7 33798 d42e9d 23 API calls __InternalCxxFrameHandler 33744->33798 33746 d331ff 33747 d330e0 33748 d33161 33773 d334c3 GetStartupInfoW _Getvals 33748->33773 33750 d33167 33774 d1cdb0 GetCommandLineW 33750->33774 33751->33747 33751->33748 33795 d42eb3 41 API calls 4 library calls 33751->33795 33763 d32ded 33762->33763 33799 d335a9 IsProcessorFeaturePresent 33763->33799 33765 d32df9 33800 d358dc 33765->33800 33767 d32dfe 33768 d32e02 33767->33768 33808 d4393e 33767->33808 33768->33739 33771 d32e19 33771->33739 33773->33750 33775 d1cdf8 33774->33775 33901 d11f80 LocalAlloc 33775->33901 33777 d1ce09 33902 d169a0 33777->33902 33779 d1ce58 33780 d1ce69 33779->33780 33781 d1ce5c 33779->33781 33910 d1c6a0 LocalAlloc LocalAlloc 33780->33910 33992 d16600 98 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 33781->33992 33784 d1ce65 33787 d1ceb0 ExitProcess 33784->33787 33785 d1ce72 33911 d1c870 33785->33911 33791 d1cea4 33994 d1cec0 LocalFree LocalFree 33791->33994 33792 d1ce9a 33993 d1cce0 CreateFileW SetFilePointer WriteFile CloseHandle 33792->33993 33795->33748 33796->33742 33797->33744 33798->33746 33799->33765 33812 d36977 33800->33812 33803 d358e5 33803->33767 33805 d358ed 33806 d358f8 33805->33806 33826 d369b3 DeleteCriticalSection 33805->33826 33806->33767 33855 d4bedb 33808->33855 33811 d358fb 7 API calls 2 library calls 33811->33768 33813 d36980 33812->33813 33815 d369a9 33813->33815 33817 d358e1 33813->33817 33827 d36bb4 33813->33827 33832 d369b3 DeleteCriticalSection 33815->33832 33817->33803 33818 d35a0a 33817->33818 33848 d36ac5 33818->33848 33821 d35a1f 33821->33805 33823 d35a2d 33824 d35a3a 33823->33824 33854 d35a3d 6 API calls ___vcrt_FlsFree 33823->33854 33824->33805 33826->33803 33833 d36a7c 33827->33833 33830 d36bec InitializeCriticalSectionAndSpinCount 33831 d36bd7 33830->33831 33831->33813 33832->33817 33834 d36a94 33833->33834 33835 d36abd 33833->33835 33834->33835 33840 d369e2 33834->33840 33835->33830 33835->33831 33838 d36aa9 GetProcAddress 33838->33835 33839 d36ab7 33838->33839 33839->33835 33842 d369ee ___vcrt_FlsGetValue 33840->33842 33841 d36a62 33841->33835 33841->33838 33842->33841 33843 d36a04 LoadLibraryExW 33842->33843 33847 d36a44 LoadLibraryExW 33842->33847 33844 d36a22 GetLastError 33843->33844 33845 d36a69 33843->33845 33844->33842 33845->33841 33846 d36a71 FreeLibrary 33845->33846 33846->33841 33847->33842 33847->33845 33849 d36a7c ___vcrt_FlsGetValue 5 API calls 33848->33849 33850 d36adf 33849->33850 33851 d36af8 TlsAlloc 33850->33851 33852 d35a14 33850->33852 33852->33821 33853 d36b76 6 API calls ___vcrt_FlsGetValue 33852->33853 33853->33823 33854->33821 33856 d32e0b 33855->33856 33857 d4beeb 33855->33857 33856->33771 33856->33811 33857->33856 33859 d46d2d 33857->33859 33860 d46d39 CallCatchBlock 33859->33860 33871 d41c9a EnterCriticalSection 33860->33871 33862 d46d40 33872 d4c4cc 33862->33872 33867 d46d6f 33867->33857 33868 d46d59 33886 d46c7d GetStdHandle GetFileType 33868->33886 33870 d46d5e 33887 d46d84 LeaveCriticalSection std::_Lockit::~_Lockit 33870->33887 33871->33862 33873 d4c4d8 CallCatchBlock 33872->33873 33874 d4c4e1 33873->33874 33875 d4c502 33873->33875 33896 d37370 14 API calls __dosmaperr 33874->33896 33888 d41c9a EnterCriticalSection 33875->33888 33878 d4c4e6 33897 d37017 41 API calls collate 33878->33897 33880 d46d4f 33880->33870 33885 d46bc7 44 API calls 33880->33885 33881 d4c53a 33898 d4c561 LeaveCriticalSection std::_Lockit::~_Lockit 33881->33898 33882 d4c50e 33882->33881 33889 d4c41c 33882->33889 33885->33868 33886->33870 33887->33867 33888->33882 33890 d470bb _unexpected 14 API calls 33889->33890 33891 d4c42e 33890->33891 33895 d4c43b 33891->33895 33899 d4776f 6 API calls std::_Lockit::_Lockit 33891->33899 33894 d4c490 33894->33882 33900 d453b8 14 API calls 2 library calls 33895->33900 33896->33878 33897->33880 33898->33880 33899->33891 33900->33894 33901->33777 33903 d169f2 33902->33903 33904 d16a34 33903->33904 33907 d16a22 33903->33907 33905 d32937 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 33904->33905 33906 d16a42 33905->33906 33906->33779 33908 d32937 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 33907->33908 33909 d16a30 33908->33909 33909->33779 33910->33785 33912 d1c889 33911->33912 33915 d1cb32 33911->33915 33913 d1cb92 33912->33913 33912->33915 33995 d16250 14 API calls 33913->33995 33918 d16a50 33915->33918 33916 d1cba2 RegOpenKeyExW 33916->33915 33917 d1cbc0 RegQueryValueExW 33916->33917 33917->33915 33919 d16aa3 GetCurrentProcess OpenProcessToken 33918->33919 33920 d16a84 33918->33920 33924 d16b09 33919->33924 33925 d16adf 33919->33925 33921 d32937 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 33920->33921 33923 d16a9f 33921->33923 33923->33791 33923->33792 33996 d15de0 33924->33996 33926 d16b02 33925->33926 33927 d16af4 CloseHandle 33925->33927 34044 d157c0 GetCurrentProcess OpenProcessToken 33926->34044 33927->33926 33931 d16b20 33934 d11770 42 API calls 33931->33934 33932 d16b2e 33935 d16b32 33932->33935 33936 d16b3f 33932->33936 33933 d16c29 33938 d16ddb 33933->33938 33944 d16c43 33933->33944 33934->33925 33939 d11770 42 API calls 33935->33939 33999 d15f40 ConvertSidToStringSidW 33936->33999 33940 d12310 56 API calls 33938->33940 33939->33925 33942 d16e04 33940->33942 33949 d146f0 52 API calls 33942->33949 33991 d16d8a 33942->33991 34049 d12310 33944->34049 33961 d16e29 33949->33961 33950 d16b85 34030 d12e60 33950->34030 33953 d16e59 33956 d12310 56 API calls 33953->33956 33954 d12e60 42 API calls 33957 d16bf5 33954->33957 33958 d16e68 33956->33958 34036 d11770 33957->34036 33969 d146f0 52 API calls 33958->33969 33958->33991 33960 d16cad 33963 d12310 56 API calls 33960->33963 33961->33953 34130 d14ac0 42 API calls 3 library calls 33961->34130 33967 d16cc7 33963->33967 33965 d16c16 CloseHandle 33965->33926 33966 d16c7c 33966->33960 34127 d14ac0 42 API calls 3 library calls 33966->34127 33971 d146f0 52 API calls 33967->33971 33967->33991 33974 d16e8a 33969->33974 33970 d16eb9 33972 d12310 56 API calls 33970->33972 33978 d16ce9 33971->33978 33975 d16ec4 33972->33975 33973 d16d19 33976 d12310 56 API calls 33973->33976 33974->33970 34131 d14ac0 42 API calls 3 library calls 33974->34131 33981 d146f0 52 API calls 33975->33981 33975->33991 33979 d16d24 33976->33979 33978->33973 34128 d14ac0 42 API calls 3 library calls 33978->34128 33984 d146f0 52 API calls 33979->33984 33979->33991 33982 d16ee6 33981->33982 33983 d16f10 33982->33983 34132 d14ac0 42 API calls 3 library calls 33982->34132 34133 d152f0 33983->34133 33989 d16d46 33984->33989 33986 d16d70 34084 d14ba0 33986->34084 33989->33986 34129 d14ac0 42 API calls 3 library calls 33989->34129 34180 d111d0 RaiseException Concurrency::cancel_current_task 33991->34180 33992->33784 33993->33791 33994->33787 33995->33916 34181 d15e40 GetTokenInformation 33996->34181 34000 d15fd2 33999->34000 34001 d15fac 33999->34001 34002 d124c0 47 API calls 34000->34002 34003 d124c0 47 API calls 34001->34003 34006 d15fc9 34002->34006 34003->34006 34004 d16003 34007 d124c0 34004->34007 34005 d15ff5 LocalFree 34005->34004 34006->34004 34006->34005 34011 d124d1 _Yarn 34007->34011 34012 d124fd 34007->34012 34008 d125f5 34192 d12770 42 API calls 34008->34192 34009 d12515 34014 d125f0 34009->34014 34015 d12566 LocalAlloc 34009->34015 34011->33950 34012->34008 34012->34009 34012->34014 34018 d12582 34012->34018 34013 d125fa 34193 d37027 41 API calls 2 library calls 34013->34193 34191 d12d70 RaiseException Concurrency::cancel_current_task 34014->34191 34015->34013 34019 d12577 34015->34019 34021 d12586 LocalAlloc 34018->34021 34027 d12593 _Yarn 34018->34027 34019->34027 34021->34027 34026 d125e5 34026->33950 34027->34013 34027->34026 34028 d125d8 34027->34028 34028->34026 34029 d125de LocalFree 34028->34029 34029->34026 34031 d12eb7 34030->34031 34032 d12e8d 34030->34032 34031->33954 34032->34030 34033 d12eaa 34032->34033 34194 d37027 41 API calls 2 library calls 34032->34194 34033->34031 34034 d12eb0 LocalFree 34033->34034 34034->34031 34037 d1179b 34036->34037 34041 d117c1 34036->34041 34038 d117ba LocalFree 34037->34038 34039 d117e5 34037->34039 34040 d117b4 34037->34040 34038->34041 34195 d37027 41 API calls 2 library calls 34039->34195 34040->34038 34040->34041 34041->33926 34041->33965 34045 d157e1 34044->34045 34046 d157e7 GetTokenInformation 34044->34046 34045->33933 34047 d15816 34046->34047 34048 d1581e CloseHandle 34046->34048 34047->34048 34048->33933 34050 d12348 34049->34050 34061 d1239c 34049->34061 34196 d32c98 6 API calls 34050->34196 34053 d12352 34054 d1235e GetProcessHeap 34053->34054 34053->34061 34197 d32faa 44 API calls 34054->34197 34055 d123b6 34063 d12427 34055->34063 34200 d32faa 44 API calls 34055->34200 34058 d1238b 34198 d32c4e EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34058->34198 34060 d12416 34201 d32c4e EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 34060->34201 34061->34063 34199 d32c98 6 API calls 34061->34199 34063->33991 34064 d146f0 34063->34064 34065 d14700 34064->34065 34066 d14766 34064->34066 34065->34066 34202 d1d156 RaiseException EnterCriticalSection LeaveCriticalSection EnterCriticalSection LeaveCriticalSection 34065->34202 34066->33966 34068 d14730 FindResourceExW 34069 d1471a 34068->34069 34069->34066 34069->34068 34072 d14771 34069->34072 34203 d145b0 LoadResource LockResource SizeofResource 34069->34203 34204 d1d156 RaiseException EnterCriticalSection LeaveCriticalSection EnterCriticalSection LeaveCriticalSection 34069->34204 34072->34066 34073 d14775 FindResourceW 34072->34073 34073->34066 34074 d14783 34073->34074 34205 d145b0 LoadResource LockResource SizeofResource 34074->34205 34076 d14790 34076->34066 34206 d37383 41 API calls 3 library calls 34076->34206 34078 d147d1 34207 d14650 RaiseException 34078->34207 34080 d147d7 34081 d147e2 34080->34081 34208 d111d0 RaiseException Concurrency::cancel_current_task 34080->34208 34081->33966 34085 d157c0 4 API calls 34084->34085 34086 d14bed 34085->34086 34087 d14bf3 34086->34087 34088 d14c15 CoInitialize CoCreateInstance 34086->34088 34089 d152f0 89 API calls 34087->34089 34090 d14c58 VariantInit ObjectStublessClient10 34088->34090 34091 d14c4f 34088->34091 34092 d14c0d 34089->34092 34093 d14cb1 IUnknown_QueryService 34090->34093 34101 d14ca8 VariantClear 34090->34101 34091->34092 34095 d15187 OleUninitialize 34091->34095 34096 d32937 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 34092->34096 34094 d14ce0 ObjectStublessClient9 34093->34094 34093->34101 34099 d14d05 34094->34099 34094->34101 34095->34092 34098 d151a7 34096->34098 34098->33991 34100 d14da8 CoAllowSetForegroundWindow 34099->34100 34099->34101 34102 d14dc2 SysAllocString 34100->34102 34103 d14e28 SysAllocString 34100->34103 34101->34091 34107 d14df8 SysAllocString 34102->34107 34108 d14def 34102->34108 34103->34102 34104 d151b0 _com_issue_error 34103->34104 34258 d111d0 RaiseException Concurrency::cancel_current_task 34104->34258 34110 d14e3d VariantInit 34107->34110 34111 d14e1d 34107->34111 34108->34104 34108->34107 34121 d14ebd 34110->34121 34111->34104 34111->34110 34112 d14ec1 VariantClear VariantClear VariantClear VariantClear SysFreeString 34112->34101 34114 d124c0 47 API calls 34114->34121 34117 d12e60 42 API calls 34117->34121 34118 d14fd5 OpenProcess WaitForSingleObject 34120 d1500b GetExitCodeProcess 34118->34120 34118->34121 34119 d14fc5 34119->34118 34256 d14270 10 API calls 34119->34256 34120->34121 34121->34112 34121->34114 34121->34117 34121->34118 34121->34119 34123 d15025 CloseHandle 34121->34123 34124 d151ab 34121->34124 34125 d1506e LocalFree 34121->34125 34209 d112f0 34121->34209 34233 d13860 CreateToolhelp32Snapshot 34121->34233 34123->34121 34257 d37027 41 API calls 2 library calls 34124->34257 34125->34121 34127->33960 34128->33973 34129->33986 34130->33953 34131->33970 34132->33983 34134 d15361 34133->34134 34871 d15d30 34134->34871 34136 d1537b 34137 d15d30 41 API calls 34136->34137 34138 d1538b 34137->34138 34875 d159c0 34138->34875 34140 d157b0 34894 d111d0 RaiseException Concurrency::cancel_current_task 34140->34894 34141 d1539b 34141->34140 34883 d37852 34141->34883 34146 d153e1 34147 d15d30 41 API calls 34146->34147 34160 d153f5 34147->34160 34148 d154cc 34149 d1551d GetForegroundWindow 34148->34149 34174 d15529 34148->34174 34149->34174 34150 d155f7 ShellExecuteExW 34151 d15612 34150->34151 34152 d15609 34150->34152 34155 d15646 34151->34155 34156 d15625 ShellExecuteExW 34151->34156 34892 d15890 6 API calls 34152->34892 34153 d15493 GetWindowsDirectoryW 34890 d15b10 70 API calls 34153->34890 34163 d156fd 34155->34163 34164 d1566c GetModuleHandleW GetProcAddress 34155->34164 34156->34155 34158 d1563d 34156->34158 34893 d15890 6 API calls 34158->34893 34159 d154b4 34891 d15b10 70 API calls 34159->34891 34160->34148 34160->34153 34165 d15721 34163->34165 34168 d1570e WaitForSingleObject GetExitCodeProcess 34163->34168 34167 d1568a AllowSetForegroundWindow 34164->34167 34886 d15940 34165->34886 34167->34163 34169 d15698 34167->34169 34168->34165 34169->34163 34170 d156a1 GetModuleHandleW GetProcAddress 34169->34170 34171 d156b4 34170->34171 34172 d156fa 34170->34172 34177 d156c8 Sleep EnumWindows 34171->34177 34178 d156ed 34171->34178 34172->34163 34174->34150 34175 d32937 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 34176 d157a8 34175->34176 34176->33991 34177->34171 34177->34178 34948 d15830 GetWindowThreadProcessId GetWindowLongW 34177->34948 34178->34172 34179 d156f3 BringWindowToTop 34178->34179 34179->34172 34182 d15e18 34181->34182 34183 d15ebe GetLastError 34181->34183 34182->33931 34182->33932 34183->34182 34184 d15ec9 34183->34184 34185 d15f0e GetTokenInformation 34184->34185 34186 d15ed9 _Getvals 34184->34186 34187 d15ee9 34184->34187 34185->34182 34186->34185 34190 d160d0 45 API calls 3 library calls 34187->34190 34189 d15ef2 34189->34185 34190->34189 34196->34053 34197->34058 34198->34061 34199->34055 34200->34060 34201->34063 34202->34069 34203->34069 34204->34069 34205->34076 34206->34078 34207->34080 34259 d11480 5 API calls 2 library calls 34209->34259 34211 d1135f 34212 d11368 34211->34212 34213 d1141c 34211->34213 34214 d11451 34212->34214 34215 d113a6 34212->34215 34218 d124c0 47 API calls 34213->34218 34230 d1141a 34213->34230 34260 d11a60 42 API calls 34214->34260 34220 d124c0 47 API calls 34215->34220 34216 d32937 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 34219 d1144d 34216->34219 34218->34230 34219->34121 34221 d113c6 34220->34221 34223 d113db 34221->34223 34226 d12e60 42 API calls 34221->34226 34227 d12e60 42 API calls 34223->34227 34226->34223 34227->34230 34230->34216 34234 d138e7 CloseHandle 34233->34234 34235 d1393e _Getvals 34233->34235 34236 d13925 34234->34236 34237 d13afd 34234->34237 34238 d1394e Process32FirstW 34235->34238 34236->34237 34239 d32937 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 34237->34239 34240 d13ab0 34238->34240 34247 d1396d 34238->34247 34241 d13b49 34239->34241 34240->34237 34242 d13aef CloseHandle 34240->34242 34241->34121 34242->34237 34243 d13970 OpenProcess 34243->34247 34244 d13a8e CloseHandle 34246 d13a9b Process32NextW 34244->34246 34246->34240 34246->34243 34247->34243 34247->34244 34247->34246 34248 d124c0 47 API calls 34247->34248 34249 d13b51 34247->34249 34252 d12e60 42 API calls 34247->34252 34253 d13a68 34247->34253 34261 d13c20 34247->34261 34286 d144a0 34247->34286 34248->34247 34291 d1d305 RaiseException Concurrency::cancel_current_task 34249->34291 34252->34247 34253->34247 34290 d140b0 69 API calls 3 library calls 34253->34290 34256->34119 34259->34211 34292 d136d0 GetSystemDirectoryW 34261->34292 34264 d13ca2 GetProcAddress 34266 d13f34 GetLastError 34264->34266 34267 d13cb6 NtQueryInformationProcess 34264->34267 34265 d13f8b 34270 d32937 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 34265->34270 34273 d13d13 34266->34273 34269 d13cd6 _Getvals 34267->34269 34267->34273 34268 d13f7b FreeLibrary 34268->34265 34272 d13ce9 ReadProcessMemory 34269->34272 34271 d13fa4 34270->34271 34271->34247 34272->34273 34274 d13d5b _Getvals 34272->34274 34273->34265 34273->34268 34275 d13d68 ReadProcessMemory 34274->34275 34275->34273 34276 d13db1 34275->34276 34276->34273 34278 d13e83 34276->34278 34282 d13e15 34276->34282 34277 d13e95 ReadProcessMemory 34280 d13ef2 34277->34280 34281 d13eda 34277->34281 34314 d11bd0 45 API calls 2 library calls 34278->34314 34284 d12e60 42 API calls 34280->34284 34283 d12e60 42 API calls 34281->34283 34282->34277 34283->34280 34285 d13f2f 34284->34285 34285->34266 34287 d144b4 34286->34287 34338 d18220 34287->34338 34290->34253 34293 d13743 34292->34293 34298 d137d2 34292->34298 34294 d12310 56 API calls 34293->34294 34293->34298 34297 d13753 34294->34297 34295 d13823 34299 d32937 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 34295->34299 34296 d1381a GetLastError 34296->34295 34300 d13851 34297->34300 34301 d1375d 34297->34301 34298->34295 34298->34296 34302 d13847 34299->34302 34323 d111d0 RaiseException Concurrency::cancel_current_task 34300->34323 34305 d146f0 52 API calls 34301->34305 34302->34264 34302->34273 34309 d13778 34305->34309 34306 d1379e 34315 d14500 34306->34315 34309->34306 34322 d14ac0 42 API calls 3 library calls 34309->34322 34310 d14500 42 API calls 34312 d137c0 _wcschr 34310->34312 34312->34298 34313 d137d6 LoadLibraryExW 34312->34313 34313->34298 34314->34277 34318 d14522 ___crtCompareStringW 34315->34318 34320 d1457d 34315->34320 34318->34320 34324 d14a10 34318->34324 34321 d137b1 34320->34321 34334 d111d0 RaiseException Concurrency::cancel_current_task 34320->34334 34321->34310 34322->34306 34325 d14a42 _Getvals 34324->34325 34326 d14a9f 34324->34326 34327 d14a46 34325->34327 34330 d14a5e _Yarn 34325->34330 34331 d14a8b 34325->34331 34326->34320 34335 d37370 14 API calls __dosmaperr 34327->34335 34329 d14a4b 34337 d37017 41 API calls collate 34329->34337 34330->34320 34331->34326 34336 d37370 14 API calls __dosmaperr 34331->34336 34335->34329 34336->34329 34337->34326 34345 d19910 34338->34345 34340 d18253 34341 d144cf 34340->34341 34344 d182a9 34340->34344 34341->34247 34342 d18610 73 API calls std::locale::_Locimp::_Makeushloc 34342->34344 34343 d18313 34343->34341 34344->34340 34344->34342 34344->34343 34366 d20df9 34345->34366 34347 d19942 34372 d19730 34347->34372 34349 d19991 34350 d199c5 34349->34350 34351 d199ba 34349->34351 34353 d199f5 34349->34353 34352 d32937 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 34350->34352 34351->34350 34354 d199be LocalFree 34351->34354 34355 d199ef 34352->34355 34408 d37027 41 API calls 2 library calls 34353->34408 34354->34350 34355->34340 34409 d16330 LocalAlloc 34366->34409 34368 d20e18 34368->34347 34369 d20e04 34369->34368 34410 d20b7c 14 API calls std::locale::_Locimp::_Locimp 34369->34410 34371 d20e16 34371->34347 34411 d20c94 34372->34411 34374 d19768 34423 d20ed6 34374->34423 34380 d20df9 std::locale::_Init 15 API calls 34381 d19942 34380->34381 34385 d19730 93 API calls 34381->34385 34386 d19991 34385->34386 34388 d199c5 34386->34388 34390 d199ba 34386->34390 34393 d199f5 34386->34393 34387 d198d7 34387->34349 34391 d32937 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 34388->34391 34389 d1984f 34397 d19839 _Yarn ___std_exception_copy 34389->34397 34513 d36c83 14 API calls ___free_lconv_mon 34389->34513 34390->34388 34394 d199be LocalFree 34390->34394 34395 d199ef 34391->34395 34515 d37027 41 API calls 2 library calls 34393->34515 34394->34388 34395->34349 34514 d19510 69 API calls 3 library calls 34397->34514 34398 d198c3 34398->34387 34508 d1d362 34398->34508 34409->34369 34410->34371 34412 d20ca0 __EH_prolog3 34411->34412 34413 d20ed6 std::_Lockit::_Lockit 7 API calls 34412->34413 34414 d20cab 34413->34414 34415 d20df9 std::locale::_Init 15 API calls 34414->34415 34422 d20cdc 34414->34422 34417 d20cbe 34415->34417 34516 d20e1c 34417->34516 34418 d20d1c moneypunct 34418->34374 34520 d20f2e 34422->34520 34424 d20ee5 34423->34424 34425 d20eec 34423->34425 34531 d41cf9 6 API calls std::_Lockit::_Lockit 34424->34531 34427 d1978f 34425->34427 34532 d320e8 EnterCriticalSection 34425->34532 34427->34398 34429 d1f544 34427->34429 34533 d419d1 34429->34533 34432 d19610 std::locale::_Locimp::_Locimp 14 API calls 34433 d1f568 34432->34433 34538 d1f49f 34433->34538 34435 d197f5 34435->34397 34436 d1f57a 34435->34436 34437 d1f586 __EH_prolog3 34436->34437 34479 d1f5cd 34437->34479 34558 d18c20 34437->34558 34440 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34445 d1f5f7 34440->34445 34441 d1f5d2 34854 d19270 73 API calls 6 library calls 34441->34854 34442 d1f5a7 34564 d16330 LocalAlloc 34442->34564 34443 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34447 d1f70d 34443->34447 34449 d1f601 34445->34449 34450 d1f6b2 34445->34450 34454 d1f713 34447->34454 34455 d1f73c 34447->34455 34448 d1f75b 34681 d28e9a 34448->34681 34855 d16330 LocalAlloc 34449->34855 34859 d1d752 72 API calls 7 library calls 34450->34859 34453 d1f5ae 34471 d1f5c1 34453->34471 34853 d18fe0 41 API calls __Getctype 34453->34853 34862 d16330 LocalAlloc 34454->34862 34863 d1d6bd 72 API calls 7 library calls 34455->34863 34458 d1f5d8 34463 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34458->34463 34459 d1f6b8 34466 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34459->34466 34461 d1f766 34864 d28969 77 API calls 9 library calls 34461->34864 34465 d1f5e0 34463->34465 34464 d1f742 34469 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34464->34469 34465->34479 34470 d1f6c0 34466->34470 34476 d1f737 34469->34476 34477 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34470->34477 34565 d1f3d9 34471->34565 34472 d1f71a 34481 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34472->34481 34473 d1f772 34482 d19610 std::locale::_Locimp::_Locimp 14 API calls 34473->34482 34474 d1f608 34478 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34474->34478 34575 d30116 34476->34575 34480 d1f6cd 34477->34480 34483 d1f625 34478->34483 34479->34440 34501 d1f6ad 34479->34501 34860 d1d7e7 72 API calls 7 library calls 34480->34860 34481->34476 34485 d1f78b moneypunct 34482->34485 34486 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34483->34486 34485->34389 34488 d1f632 34486->34488 34487 d1f6d5 34489 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34487->34489 34856 d16330 LocalAlloc 34488->34856 34492 d1f6dd 34489->34492 34491 d1f63b 34495 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34491->34495 34493 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34492->34493 34494 d1f6ea 34493->34494 34861 d1d87c 72 API calls 8 library calls 34494->34861 34497 d1f659 34495->34497 34500 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34497->34500 34498 d1f6f2 34499 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34498->34499 34499->34501 34502 d1f666 34500->34502 34501->34443 34501->34476 34857 d16330 LocalAlloc 34502->34857 34504 d1f670 34505 d1f69b 34504->34505 34858 d1f098 42 API calls 4 library calls 34504->34858 34507 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34505->34507 34507->34501 34865 d1d28b 34508->34865 34512 d19909 34512->34380 34513->34397 34514->34398 34517 d20cc6 34516->34517 34518 d20e28 34516->34518 34527 d19610 34517->34527 34519 d32096 std::locale::_Setgloballocale 43 API calls 34518->34519 34519->34517 34521 d41d07 34520->34521 34522 d20f38 34520->34522 34523 d41ce2 std::_Lockit::~_Lockit LeaveCriticalSection 34521->34523 34524 d320f6 std::_Lockit::~_Lockit LeaveCriticalSection 34522->34524 34526 d20f4b 34522->34526 34525 d41d0e 34523->34525 34524->34526 34525->34418 34526->34418 34528 d19640 34527->34528 34530 d1964a _Yarn ___std_exception_copy 34527->34530 34529 d36c83 ~collate 14 API calls 34528->34529 34528->34530 34529->34530 34530->34422 34531->34427 34532->34427 34534 d478ca std::_Lockit::_Lockit 5 API calls 34533->34534 34535 d419de 34534->34535 34536 d4177c std::_Locinfo::_Locinfo_ctor 68 API calls 34535->34536 34537 d1f550 34536->34537 34537->34432 34539 d1f4b1 34538->34539 34540 d1f539 34538->34540 34542 d1f4c3 34539->34542 34544 d1f4ca 34539->34544 34548 d1f4d6 34539->34548 34541 d1d362 std::_Locinfo::_Locinfo_Addcats 42 API calls 34540->34541 34543 d1f543 34541->34543 34545 d419d1 std::_Locinfo::_Locinfo_ctor 68 API calls 34542->34545 34546 d419d1 std::_Locinfo::_Locinfo_ctor 68 API calls 34543->34546 34547 d19610 std::locale::_Locimp::_Locimp 14 API calls 34544->34547 34550 d1f533 34544->34550 34545->34544 34549 d1f550 34546->34549 34547->34550 34551 d419d1 std::_Locinfo::_Locinfo_ctor 68 API calls 34548->34551 34552 d1f4f8 34548->34552 34553 d19610 std::locale::_Locimp::_Locimp 14 API calls 34549->34553 34550->34435 34551->34548 34554 d419d1 std::_Locinfo::_Locinfo_ctor 68 API calls 34552->34554 34555 d1f568 34553->34555 34554->34544 34556 d1f49f std::_Locinfo::_Locinfo_Addcats 69 API calls 34555->34556 34557 d1f574 34556->34557 34557->34435 34559 d18c4b 34558->34559 34560 d18c7d 34558->34560 34561 d20ed6 std::_Lockit::_Lockit 7 API calls 34559->34561 34560->34441 34560->34442 34562 d18c55 34561->34562 34563 d20f2e std::_Lockit::~_Lockit LeaveCriticalSection LeaveCriticalSection 34562->34563 34563->34560 34564->34453 34566 d1f3e5 __EH_prolog3 34565->34566 34567 d20ed6 std::_Lockit::_Lockit 7 API calls 34566->34567 34568 d1f3ef std::locale::_Locimp::_Locimp_Addfac 34567->34568 34569 d1f499 34568->34569 34571 d1f41d 34568->34571 34570 d1d2e8 Concurrency::cancel_current_task RaiseException 34569->34570 34572 d1f49e 34570->34572 34573 d20f2e std::_Lockit::~_Lockit LeaveCriticalSection LeaveCriticalSection 34571->34573 34574 d1f493 moneypunct 34573->34574 34574->34479 34576 d30122 __EH_prolog3 34575->34576 34577 d2edf2 collate 74 API calls 34576->34577 34578 d3012b 34577->34578 34579 d30185 34578->34579 34581 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34578->34581 34580 d301d8 34579->34580 34583 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34579->34583 34587 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34580->34587 34588 d30320 34580->34588 34582 d3014b 34581->34582 34584 d3018a 34582->34584 34585 d3014f 34582->34585 34586 d301ae 34583->34586 34594 d2e843 std::locale::_Locimp::_Makeloc 74 API calls 34584->34594 34589 d16330 moneypunct LocalAlloc 34585->34589 34590 d301b4 34586->34590 34591 d301dd 34586->34591 34592 d30203 34587->34592 34593 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34588->34593 34600 d3041d moneypunct 34588->34600 34595 d30159 34589->34595 34596 d16330 moneypunct LocalAlloc 34590->34596 34601 d2e8d8 std::locale::_Locimp::_Makeloc 72 API calls 34591->34601 34597 d30325 34592->34597 34598 d3020d 34592->34598 34599 d303a2 34593->34599 34602 d30192 34594->34602 34603 d30171 34595->34603 34611 d32344 __Getcoll 41 API calls 34595->34611 34604 d301bb 34596->34604 34608 d2e96d std::locale::_Locimp::_Makeloc 72 API calls 34597->34608 34605 d16330 moneypunct LocalAlloc 34598->34605 34606 d30422 34599->34606 34607 d303a8 34599->34607 34600->34448 34609 d301e3 34601->34609 34610 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34602->34610 34619 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34603->34619 34623 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34604->34623 34612 d30214 34605->34612 34614 d2ebc1 std::locale::_Locimp::_Makeloc 73 API calls 34606->34614 34613 d16330 moneypunct LocalAlloc 34607->34613 34615 d3032b 34608->34615 34616 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34609->34616 34610->34579 34611->34603 34627 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34612->34627 34620 d303af 34613->34620 34617 d30428 34614->34617 34618 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34615->34618 34616->34580 34621 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34617->34621 34622 d30333 34618->34622 34619->34579 34624 d303c9 34620->34624 34628 d2eceb numpunct 44 API calls 34620->34628 34625 d30430 34621->34625 34626 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34622->34626 34623->34580 34629 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34624->34629 34630 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34625->34630 34631 d30340 34626->34631 34632 d30231 34627->34632 34628->34624 34633 d303d9 34629->34633 34634 d3043d 34630->34634 34635 d2ea02 std::locale::_Locimp::_Makeloc 72 API calls 34631->34635 34636 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34632->34636 34637 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34633->34637 34638 d2ec56 std::locale::_Locimp::_Makeloc 72 API calls 34634->34638 34639 d30348 34635->34639 34640 d3023e 34636->34640 34642 d303e6 34637->34642 34643 d30445 34638->34643 34644 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34639->34644 34641 d16330 moneypunct LocalAlloc 34640->34641 34648 d30247 34641->34648 34645 d16330 moneypunct LocalAlloc 34642->34645 34646 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34643->34646 34647 d30350 34644->34647 34649 d303ef 34645->34649 34646->34600 34650 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34647->34650 34653 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34648->34653 34651 d30411 34649->34651 34654 d300ed std::locale::_Locimp::_Makeloc 14 API calls 34649->34654 34652 d3035d 34650->34652 34658 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34651->34658 34655 d2eb2c std::locale::_Locimp::_Makeloc 72 API calls 34652->34655 34656 d30265 34653->34656 34654->34651 34657 d30365 34655->34657 34659 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34656->34659 34660 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34657->34660 34658->34600 34661 d30272 34659->34661 34662 d3036d 34660->34662 34663 d16330 moneypunct LocalAlloc 34661->34663 34664 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34662->34664 34665 d3027c 34663->34665 34666 d3037a 34664->34666 34668 d302aa 34665->34668 34670 d2ffea moneypunct 42 API calls 34665->34670 34667 d2ea97 std::locale::_Locimp::_Makeloc 72 API calls 34666->34667 34669 d30382 34667->34669 34671 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34668->34671 34672 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34669->34672 34670->34668 34673 d302c2 34671->34673 34672->34588 34674 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34673->34674 34675 d302cf 34674->34675 34676 d16330 moneypunct LocalAlloc 34675->34676 34677 d302d9 34676->34677 34678 d30308 34677->34678 34679 d2ffea moneypunct 42 API calls 34677->34679 34680 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34678->34680 34679->34678 34680->34588 34682 d28ea6 __EH_prolog3 34681->34682 34683 d28efb 34682->34683 34684 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34682->34684 34686 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34683->34686 34836 d28fde 34683->34836 34687 d28ec1 34684->34687 34685 d23a6b collate 74 API calls 34690 d2903b 34685->34690 34691 d28f29 34686->34691 34688 d28f00 34687->34688 34689 d28ec6 34687->34689 34696 d18610 std::locale::_Locimp::_Makeushloc 73 API calls 34688->34696 34692 d16330 moneypunct LocalAlloc 34689->34692 34693 d29091 34690->34693 34699 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34690->34699 34694 d28fe3 34691->34694 34695 d28f35 34691->34695 34698 d28ed0 34692->34698 34701 d290e9 34693->34701 34707 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34693->34707 34697 d22c4a std::locale::_Locimp::_Makeushloc 72 API calls 34694->34697 34700 d16330 moneypunct LocalAlloc 34695->34700 34702 d28f0a 34696->34702 34703 d28feb 34697->34703 34704 d28eed 34698->34704 34710 d18bd0 std::locale::_Locimp::_Makeushloc 41 API calls 34698->34710 34705 d29055 34699->34705 34706 d28f3c 34700->34706 34714 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34701->34714 34715 d29231 34701->34715 34708 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34702->34708 34709 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34703->34709 34720 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34704->34720 34711 d29096 34705->34711 34712 d2905b 34705->34712 34731 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34706->34731 34713 d290bd 34707->34713 34716 d28f12 34708->34716 34718 d28ff3 34709->34718 34710->34704 34717 d224b9 std::locale::_Locimp::_Makeushloc 74 API calls 34711->34717 34719 d16330 moneypunct LocalAlloc 34712->34719 34721 d290c5 34713->34721 34722 d290ee 34713->34722 34723 d29117 34714->34723 34724 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34715->34724 34829 d2933a 34715->34829 34716->34683 34727 d290a0 34717->34727 34729 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34718->34729 34730 d29065 34719->34730 34720->34683 34732 d16330 moneypunct LocalAlloc 34721->34732 34728 d22678 std::locale::_Locimp::_Makeushloc 72 API calls 34722->34728 34733 d29123 34723->34733 34734 d29236 34723->34734 34735 d292bc 34724->34735 34725 d293ad moneypunct 34725->34461 34726 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34736 d29381 34726->34736 34737 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34727->34737 34738 d290f6 34728->34738 34740 d29000 34729->34740 34741 d2907d 34730->34741 34754 d32344 __Getcoll 41 API calls 34730->34754 34742 d28f59 34731->34742 34743 d290cc 34732->34743 34744 d16330 moneypunct LocalAlloc 34733->34744 34739 d227a2 std::locale::_Locimp::_Makeushloc 72 API calls 34734->34739 34745 d292c4 34735->34745 34746 d2933f 34735->34746 34747 d293b2 34736->34747 34748 d29389 34736->34748 34737->34693 34752 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34738->34752 34749 d2923e 34739->34749 34750 d1b700 std::locale::_Locimp::_Makeushloc 73 API calls 34740->34750 34764 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34741->34764 34751 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34742->34751 34771 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34743->34771 34755 d2912a 34744->34755 34756 d16330 moneypunct LocalAlloc 34745->34756 34753 d22e9e std::locale::_Locimp::_Makeushloc 73 API calls 34746->34753 34761 d2238f std::locale::_Locimp::_Makeushloc 72 API calls 34747->34761 34758 d16330 moneypunct LocalAlloc 34748->34758 34759 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34749->34759 34760 d2900a 34750->34760 34762 d28f66 34751->34762 34752->34701 34763 d29347 34753->34763 34754->34741 34773 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34755->34773 34757 d292cb 34756->34757 34765 d292e5 34757->34765 34774 d23114 numpunct 44 API calls 34757->34774 34766 d29390 34758->34766 34767 d29246 34759->34767 34768 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34760->34768 34769 d293ba 34761->34769 34770 d16330 moneypunct LocalAlloc 34762->34770 34772 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34763->34772 34764->34693 34782 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34765->34782 34775 d293a3 34766->34775 34783 d230aa codecvt 41 API calls 34766->34783 34776 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34767->34776 34777 d29012 34768->34777 34778 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34769->34778 34779 d28f6f 34770->34779 34771->34701 34780 d2934f 34772->34780 34781 d29147 34773->34781 34774->34765 34785 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34775->34785 34784 d29253 34776->34784 34786 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34777->34786 34778->34725 34797 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34779->34797 34787 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34780->34787 34788 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34781->34788 34789 d292f5 34782->34789 34783->34775 34790 d228cc std::locale::_Locimp::_Makeushloc 72 API calls 34784->34790 34785->34725 34791 d2901f 34786->34791 34792 d2935c 34787->34792 34793 d29154 34788->34793 34794 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34789->34794 34795 d2925d 34790->34795 34796 d1b8b0 std::locale::_Locimp::_Makeushloc 75 API calls 34791->34796 34798 d1b500 std::locale::_Locimp::_Makeushloc 73 API calls 34792->34798 34799 d16330 moneypunct LocalAlloc 34793->34799 34800 d29302 34794->34800 34801 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34795->34801 34802 d29029 34796->34802 34803 d28f8c 34797->34803 34804 d29366 34798->34804 34805 d2915d 34799->34805 34806 d16330 moneypunct LocalAlloc 34800->34806 34807 d29265 34801->34807 34808 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34802->34808 34809 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34803->34809 34810 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34804->34810 34819 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34805->34819 34811 d2930c 34806->34811 34812 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34807->34812 34813 d29031 34808->34813 34814 d28f99 34809->34814 34815 d2936e 34810->34815 34816 d2932c 34811->34816 34820 d1bf80 std::locale::_Locimp::_Makeushloc 42 API calls 34811->34820 34817 d29272 34812->34817 34813->34836 34818 d16330 moneypunct LocalAlloc 34814->34818 34815->34829 34825 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34816->34825 34821 d22b20 std::locale::_Locimp::_Makeushloc 72 API calls 34817->34821 34822 d28fa3 34818->34822 34823 d2917a 34819->34823 34820->34816 34824 d2927c 34821->34824 34826 d28fcc 34822->34826 34830 d1bd90 std::locale::_Locimp::_Makeushloc 44 API calls 34822->34830 34827 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34823->34827 34828 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34824->34828 34825->34829 34833 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34826->34833 34831 d29187 34827->34831 34832 d29284 34828->34832 34829->34725 34829->34726 34830->34826 34834 d16330 moneypunct LocalAlloc 34831->34834 34835 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34832->34835 34833->34836 34837 d29191 34834->34837 34838 d29291 34835->34838 34836->34685 34839 d291bd 34837->34839 34841 d28451 moneypunct 42 API calls 34837->34841 34840 d22a8b std::locale::_Locimp::_Makeushloc 72 API calls 34838->34840 34843 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34839->34843 34842 d2929b 34840->34842 34841->34839 34844 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34842->34844 34845 d291d5 34843->34845 34844->34715 34846 d18c20 std::locale::_Locimp::_Makeushloc 9 API calls 34845->34846 34847 d291e2 34846->34847 34848 d16330 moneypunct LocalAlloc 34847->34848 34849 d291ec 34848->34849 34850 d29219 34849->34850 34851 d28451 moneypunct 42 API calls 34849->34851 34852 d1f3d9 std::locale::_Locimp::_Locimp_Addfac 10 API calls 34850->34852 34851->34850 34852->34715 34853->34471 34854->34458 34855->34474 34856->34491 34857->34504 34858->34505 34859->34459 34860->34487 34861->34498 34862->34472 34863->34464 34864->34473 34866 d1c240 std::invalid_argument::invalid_argument 41 API calls 34865->34866 34867 d1d29d 34866->34867 34868 d33e5a 34867->34868 34869 d33ea1 RaiseException 34868->34869 34870 d33e74 34868->34870 34869->34512 34870->34869 34872 d15d6e 34871->34872 34873 d15d7d 34872->34873 34874 d14a10 41 API calls 34872->34874 34873->34136 34874->34873 34876 d159f8 34875->34876 34880 d15a03 34875->34880 34877 d15d30 41 API calls 34876->34877 34879 d15a01 34877->34879 34878 d12310 56 API calls 34881 d15a1a 34878->34881 34879->34141 34880->34878 34880->34881 34895 d15a60 42 API calls 34881->34895 34896 d37869 34883->34896 34887 d15971 34886->34887 34888 d1572d 34886->34888 34887->34888 34889 d15981 CloseHandle 34887->34889 34888->34175 34889->34888 34890->34159 34891->34148 34892->34151 34893->34155 34895->34879 34897 d37078 __cftoe 41 API calls 34896->34897 34898 d3787c 34897->34898 34901 d376d9 34898->34901 34902 d376f3 34901->34902 34903 d37709 ___crtCompareStringW 34901->34903 34936 d37370 14 API calls __dosmaperr 34902->34936 34903->34902 34905 d37720 34903->34905 34910 d37702 34905->34910 34938 d45c2a 6 API calls 2 library calls 34905->34938 34908 d3776e 34911 d37778 34908->34911 34912 d3778f 34908->34912 34909 d32937 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 34914 d153d3 34909->34914 34910->34909 34939 d37370 14 API calls __dosmaperr 34911->34939 34913 d37794 34912->34913 34917 d377a5 34912->34917 34941 d37370 14 API calls __dosmaperr 34913->34941 34914->34140 34914->34146 34918 d37826 34917->34918 34924 d45bdc std::_Locinfo::_W_Getmonths 15 API calls 34917->34924 34926 d377b9 __alloca_probe_16 34917->34926 34945 d37370 14 API calls __dosmaperr 34918->34945 34919 d3777d 34940 d37370 14 API calls __dosmaperr 34919->34940 34920 d376f8 34937 d37017 41 API calls collate 34920->34937 34923 d3782b 34946 d37370 14 API calls __dosmaperr 34923->34946 34924->34926 34926->34918 34929 d377e6 34926->34929 34927 d37813 34947 d32326 14 API calls ~collate 34927->34947 34942 d45c2a 6 API calls 2 library calls 34929->34942 34931 d37802 34932 d3781a 34931->34932 34933 d37809 34931->34933 34944 d37370 14 API calls __dosmaperr 34932->34944 34943 d3b762 41 API calls 2 library calls 34933->34943 34936->34920 34937->34910 34938->34908 34939->34919 34940->34910 34941->34920 34942->34931 34943->34927 34944->34927 34945->34923 34946->34927 34947->34910 34949 d36c9e 34950 d36cab 34949->34950 34952 d36cc6 34949->34952 34951 d36cb7 34950->34951 34950->34952 34970 d37370 14 API calls __dosmaperr 34951->34970 34955 d36cd5 34952->34955 34971 d453f2 42 API calls 2 library calls 34952->34971 34958 d45425 34955->34958 34957 d36cbc _Getvals 34959 d45432 34958->34959 34960 d4543d 34958->34960 34961 d45bdc std::_Locinfo::_W_Getmonths 15 API calls 34959->34961 34962 d45445 34960->34962 34968 d4544e std::_Locinfo::_W_Getmonths 34960->34968 34966 d4543a 34961->34966 34972 d453b8 14 API calls 2 library calls 34962->34972 34964 d45453 34973 d37370 14 API calls __dosmaperr 34964->34973 34965 d45478 HeapReAlloc 34965->34966 34965->34968 34966->34957 34968->34964 34968->34965 34974 d4bf83 EnterCriticalSection LeaveCriticalSection std::_Locinfo::_W_Getmonths 34968->34974 34970->34957 34971->34955 34972->34966 34973->34966 34974->34968

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 0 d14ba0-d14bf1 call d157c0 3 d14bf3-d14c10 call d152f0 0->3 4 d14c15-d14c4d CoInitialize CoCreateInstance 0->4 14 d15190-d151aa call d32937 3->14 6 d14c58-d14ca6 VariantInit ObjectStublessClient10 4->6 7 d14c4f-d14c53 4->7 10 d14cb1-d14cd5 IUnknown_QueryService 6->10 11 d14ca8-d14cac 6->11 9 d15169-d15172 7->9 12 d15174-d15176 9->12 13 d1517a-d15185 9->13 16 d14ce0-d14cfa ObjectStublessClient9 10->16 17 d14cd7-d14cdb 10->17 15 d1514b-d15154 11->15 12->13 18 d15187 OleUninitialize 13->18 19 d1518d 13->19 24 d15156-d15158 15->24 25 d1515c-d15167 VariantClear 15->25 22 d14d05-d14d26 16->22 23 d14cfc-d14d00 16->23 21 d1513a-d15143 17->21 18->19 19->14 21->15 27 d15145-d15147 21->27 31 d14d31-d14d4f 22->31 32 d14d28-d14d2c 22->32 28 d15129-d15132 23->28 24->25 25->9 27->15 28->21 29 d15134-d15136 28->29 29->21 36 d14d51-d14d55 31->36 37 d14d5a-d14d74 31->37 33 d15118-d15121 32->33 33->28 35 d15123-d15125 33->35 35->28 38 d15107-d15110 36->38 41 d14d76-d14d7a 37->41 42 d14d7f-d14d9d 37->42 38->33 39 d15112-d15114 38->39 39->33 43 d150f6-d150ff 41->43 46 d14da8-d14dc0 CoAllowSetForegroundWindow 42->46 47 d14d9f-d14da3 42->47 43->38 44 d15101-d15103 43->44 44->38 49 d14dc2-d14dc4 46->49 50 d14e28-d14e35 SysAllocString 46->50 48 d150e5-d150ee 47->48 48->43 53 d150f0-d150f2 48->53 54 d14dca-d14ded SysAllocString 49->54 51 d14e3b 50->51 52 d151ba-d15201 call d111d0 50->52 51->54 62 d15203-d15205 52->62 63 d15209-d15217 52->63 53->43 56 d14df8-d14e1b SysAllocString 54->56 57 d14def-d14df2 54->57 60 d14e3d-d14ebf VariantInit 56->60 61 d14e1d-d14e20 56->61 57->56 58 d151b0-d151b5 call d1cf40 57->58 58->52 67 d14ec1-d14ec5 60->67 68 d14eca-d14ece 60->68 61->58 64 d14e26 61->64 62->63 64->60 69 d150a0-d150df VariantClear * 4 SysFreeString 67->69 70 d14ed4 68->70 71 d1509c 68->71 69->48 72 d14ed6-d14f0c 70->72 71->69 73 d14f10-d14f19 72->73 73->73 74 d14f1b-d14fa2 call d124c0 call d112f0 call d13860 call d12e60 * 2 73->74 85 d14fa4-d14fa8 74->85 86 d14faa 74->86 87 d14fb1-d14fb3 85->87 86->87 88 d15036-d15046 87->88 89 d14fb9-d14fc3 87->89 90 d15048-d15057 88->90 91 d1508d-d15096 88->91 92 d14fd5-d15009 OpenProcess WaitForSingleObject 89->92 93 d14fc5-d14fd3 call d14270 89->93 96 d15059-d15064 90->96 97 d1506a-d1506c 90->97 91->71 91->72 94 d15013-d15023 92->94 95 d1500b-d1500d GetExitCodeProcess 92->95 93->92 94->88 99 d15025-d1502c CloseHandle 94->99 95->94 96->97 100 d151ab call d37027 96->100 101 d15075-d15086 97->101 102 d1506e-d1506f LocalFree 97->102 99->88 100->58 101->91 102->101
                                                                                  APIs
                                                                                    • Part of subcall function 00D157C0: GetCurrentProcess.KERNEL32(00000008,?,F83EBEA6,?,-00000010), ref: 00D157D0
                                                                                    • Part of subcall function 00D157C0: OpenProcessToken.ADVAPI32(00000000), ref: 00D157D7
                                                                                  • CoInitialize.OLE32(00000000), ref: 00D14C15
                                                                                  • CoCreateInstance.OLE32(00D572B0,00000000,00000004,00D65104,00000000), ref: 00D14C45
                                                                                  • OleUninitialize.OLE32 ref: 00D15187
                                                                                  • _com_issue_error.COMSUPP ref: 00D151B5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CreateCurrentInitializeInstanceOpenTokenUninitialize_com_issue_error
                                                                                  • String ID:
                                                                                  • API String ID: 928366108-0
                                                                                  • Opcode ID: c807a461d715d6fa1131d6d6a4f7579d11f70501de1456bba8123504fc8b971c
                                                                                  • Instruction ID: 909dc11eac9c3874045a40d15ef89a5bb7e4d0a71f9d31d393d55406e3688f73
                                                                                  • Opcode Fuzzy Hash: c807a461d715d6fa1131d6d6a4f7579d11f70501de1456bba8123504fc8b971c
                                                                                  • Instruction Fuzzy Hash: 17229270904348EFEF11CFA8E948BDDBBB4AF45304F248199E845EB381DB759A85CB61
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 105 d13c20-d13c9c call d136d0 108 d13f40-d13f78 105->108 109 d13ca2-d13cb0 GetProcAddress 105->109 110 d13f8b-d13fa7 call d32937 108->110 111 d13f7a 108->111 112 d13f34-d13f3a GetLastError 109->112 113 d13cb6-d13cd0 NtQueryInformationProcess 109->113 114 d13f7b-d13f81 FreeLibrary 111->114 112->108 113->108 115 d13cd6-d13d11 call d34080 ReadProcessMemory 113->115 114->110 120 d13d13-d13d2c 115->120 121 d13d5b-d13d8a call d34080 ReadProcessMemory 115->121 122 d13d36-d13d4f 120->122 126 d13db1-d13db7 121->126 127 d13d8c-d13daf 121->127 122->110 124 d13d55-d13d56 122->124 124->114 128 d13dd7-d13e13 126->128 129 d13db9-d13dd2 126->129 127->122 130 d13e15-d13e29 128->130 131 d13e2b-d13e36 128->131 129->122 132 d13e95-d13ed8 ReadProcessMemory 130->132 133 d13e83-d13e90 call d11bd0 131->133 134 d13e38-d13e57 131->134 136 d13ef7-d13f2f call d12e60 132->136 137 d13eda-d13ef2 call d12e60 132->137 133->132 138 d13e72-d13e81 134->138 139 d13e59-d13e6c 134->139 136->112 137->136 138->132 139->138
                                                                                  APIs
                                                                                    • Part of subcall function 00D136D0: GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00D13735
                                                                                    • Part of subcall function 00D136D0: _wcschr.LIBVCRUNTIME ref: 00D137C6
                                                                                  • GetProcAddress.KERNEL32(?,NtQueryInformationProcess), ref: 00D13CA8
                                                                                  • NtQueryInformationProcess.NTDLL(?,00000000,00000000,00000018,00000000), ref: 00D13CC4
                                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,000001D8,00000000,00000000,00000018,00000000), ref: 00D13D01
                                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000048,00000000,?,000001D8,00000000,00000000,00000018,00000000), ref: 00D13D7A
                                                                                  • ReadProcessMemory.KERNELBASE(?,?,00000000,?,00000000,?,?,?,00000000,?,?,?,00000048,00000000,?,000001D8), ref: 00D13EB1
                                                                                  • GetLastError.KERNEL32 ref: 00D13F34
                                                                                  • FreeLibrary.KERNEL32(?), ref: 00D13F7B
                                                                                  Strings
                                                                                  • NtQueryInformationProcess, xrefs: 00D13CA2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$MemoryRead$AddressDirectoryErrorFreeInformationLastLibraryProcQuerySystem_wcschr
                                                                                  • String ID: NtQueryInformationProcess
                                                                                  • API String ID: 847666571-2781105232
                                                                                  • Opcode ID: de3c7cea94bf982ce80ad4b22ee4050a6ee8e9de74e30e2849f12fd1e897e5ef
                                                                                  • Instruction ID: 7303e911669f328bd4acc4add514e140d6b9457ec7ab3e2c38d35ded99267cd0
                                                                                  • Opcode Fuzzy Hash: de3c7cea94bf982ce80ad4b22ee4050a6ee8e9de74e30e2849f12fd1e897e5ef
                                                                                  • Instruction Fuzzy Hash: ACA14A709047499EDB20CF64DC49BEEBBF0EF48314F244599E449A7280EBB5AAC4CF61
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 240 d13860-d138e5 CreateToolhelp32Snapshot 241 d138e7-d1391f CloseHandle 240->241 242 d1393e-d13967 call d34080 Process32FirstW 240->242 243 d13925-d13939 241->243 244 d13b2c-d13b50 call d32937 241->244 249 d13ab6-d13aed 242->249 250 d1396d 242->250 254 d13b22 243->254 252 d13afd-d13b0c 249->252 253 d13aef-d13af6 CloseHandle 249->253 255 d13970-d13993 OpenProcess 250->255 252->244 256 d13b0e-d13b1e 252->256 253->252 254->244 257 d13995-d139a1 255->257 258 d139a6-d139dc call d13c20 255->258 256->254 259 d13a8e-d13a94 CloseHandle 257->259 264 d139e3-d139ec 258->264 261 d13a9b-d13aaa Process32NextW 259->261 261->255 263 d13ab0-d13ab3 261->263 263->249 264->264 265 d139ee-d13a1b call d124c0 264->265 268 d13b51-d13b56 call d1d305 265->268 269 d13a21-d13a54 call d144a0 call d12e60 * 2 265->269 277 d13a56-d13a59 269->277 278 d13a7e-d13a8b 269->278 280 d13a68-d13a7b call d140b0 277->280 281 d13a5b-d13a66 277->281 278->261 279 d13a8d 278->279 279->259 280->278 281->278
                                                                                  APIs
                                                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00D138CB
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00D1390B
                                                                                  • Process32FirstW.KERNEL32(?,00000000), ref: 00D1395F
                                                                                  • OpenProcess.KERNEL32(00000410,00000000,?), ref: 00D1397A
                                                                                  • CloseHandle.KERNELBASE(00000000), ref: 00D13A8E
                                                                                  • Process32NextW.KERNEL32(?,00000000), ref: 00D13AA2
                                                                                  • CloseHandle.KERNEL32(?), ref: 00D13AF0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$Process32$CreateFirstNextOpenProcessSnapshotToolhelp32
                                                                                  • String ID:
                                                                                  • API String ID: 708755948-0
                                                                                  • Opcode ID: 64ede5f8d2b4d9ccbf43f26a88ac47715ea03add9ac47ab2c9ecc9cb1b40f7dd
                                                                                  • Instruction ID: 87afba110853b1ecdbbac79fa01fa53d176e42b934e88dddc9ee6e85ebbcef56
                                                                                  • Opcode Fuzzy Hash: 64ede5f8d2b4d9ccbf43f26a88ac47715ea03add9ac47ab2c9ecc9cb1b40f7dd
                                                                                  • Instruction Fuzzy Hash: 5CA1F9B1905249EFDF10CFA8D988BDEBBF8BF48304F244159E815AB380D7759A44CBA0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 306 d16a50-d16a82 307 d16aa3-d16add GetCurrentProcess OpenProcessToken 306->307 308 d16a84-d16aa2 call d32937 306->308 312 d16b09-d16b1e call d15de0 307->312 313 d16adf-d16af2 307->313 320 d16b20-d16b2c call d11770 312->320 321 d16b2e-d16b30 312->321 314 d16b02-d16b04 313->314 315 d16af4-d16afb CloseHandle 313->315 317 d16c24-d16c2b call d157c0 314->317 315->314 327 d16c31-d16c35 317->327 328 d16ddb-d16e06 call d12310 317->328 320->313 324 d16b32-d16b3d call d11770 321->324 325 d16b3f-d16ba5 call d15f40 call d124c0 321->325 324->313 342 d16ba7-d16ba9 325->342 343 d16bdb 325->343 327->328 333 d16c3b-d16c3d 327->333 338 d16f96-d16fa0 call d111d0 328->338 339 d16e0c-d16e2b call d146f0 328->339 333->328 337 d16c43-d16c59 call d12310 333->337 337->338 350 d16c5f-d16c7e call d146f0 337->350 359 d16e59-d16e6a call d12310 339->359 360 d16e2d-d16e2f 339->360 347 d16c88-d16c8a 342->347 348 d16baf-d16bb8 342->348 349 d16bdd-d16c14 call d12e60 * 2 call d11770 343->349 347->349 348->343 353 d16bba-d16bbc 348->353 349->317 383 d16c16-d16c1d CloseHandle 349->383 372 d16c80-d16c82 350->372 373 d16cad-d16cc9 call d12310 350->373 356 d16bbf 353->356 356->343 361 d16bc1-d16bc4 356->361 359->338 376 d16e70-d16e8c call d146f0 359->376 364 d16e31-d16e33 360->364 365 d16e35-d16e3a 360->365 361->347 366 d16bca-d16bd9 361->366 374 d16e4f-d16e54 call d14ac0 364->374 375 d16e40-d16e49 365->375 366->343 366->356 378 d16c84-d16c86 372->378 379 d16c8f-d16c91 372->379 373->338 390 d16ccf-d16ceb call d146f0 373->390 374->359 375->375 381 d16e4b-d16e4d 375->381 394 d16eb9-d16ec6 call d12310 376->394 395 d16e8e-d16e90 376->395 384 d16ca3-d16ca8 call d14ac0 378->384 385 d16c94-d16c9d 379->385 381->374 383->317 384->373 385->385 388 d16c9f-d16ca1 385->388 388->384 401 d16d19-d16d26 call d12310 390->401 402 d16ced-d16cef 390->402 394->338 406 d16ecc-d16ee8 call d146f0 394->406 397 d16e92-d16e94 395->397 398 d16e96-d16e9b 395->398 403 d16eaf-d16eb4 call d14ac0 397->403 404 d16ea0-d16ea9 398->404 401->338 418 d16d2c-d16d48 call d146f0 401->418 407 d16cf1-d16cf3 402->407 408 d16cf5-d16cfa 402->408 403->394 404->404 410 d16eab-d16ead 404->410 422 d16f10-d16f47 call d152f0 406->422 423 d16eea-d16eec 406->423 412 d16d0f-d16d14 call d14ac0 407->412 413 d16d00-d16d09 408->413 410->403 412->401 413->413 416 d16d0b-d16d0d 413->416 416->412 432 d16d70-d16d85 call d14ba0 418->432 433 d16d4a-d16d4c 418->433 439 d16f51-d16f65 422->439 440 d16f49-d16f4c 422->440 425 d16ef2-d16ef4 423->425 426 d16eee-d16ef0 423->426 430 d16ef7-d16f00 425->430 429 d16f06-d16f0b call d14ac0 426->429 429->422 430->430 437 d16f02-d16f04 430->437 445 d16d8a-d16da4 432->445 434 d16d52-d16d54 433->434 435 d16d4e-d16d50 433->435 442 d16d57-d16d60 434->442 441 d16d66-d16d6b call d14ac0 435->441 437->429 443 d16f67-d16f6a 439->443 444 d16f6f-d16f76 439->444 440->439 441->432 442->442 446 d16d62-d16d64 442->446 443->444 448 d16f79-d16f84 444->448 449 d16da6-d16da9 445->449 450 d16dae-d16dc2 445->450 446->441 451 d16f86-d16f89 448->451 452 d16f8e 448->452 449->450 453 d16dc4-d16dc7 450->453 454 d16dcc-d16dd6 450->454 451->452 452->338 453->454 454->448
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32 ref: 00D16AC8
                                                                                  • OpenProcessToken.ADVAPI32(00000000,00000008,00000000), ref: 00D16AD5
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00D16AF5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CloseCurrentHandleOpenToken
                                                                                  • String ID: S-1-5-18
                                                                                  • API String ID: 4052875653-4289277601
                                                                                  • Opcode ID: 42d12eaf4ffed2deedeb0e7948c5905c74eadc2f238ef51e16dba0603c89fdb4
                                                                                  • Instruction ID: 52df4e798d5e30ac641eca1b0648fd857b2a9cda4266e002e907cbe9bc668e99
                                                                                  • Opcode Fuzzy Hash: 42d12eaf4ffed2deedeb0e7948c5905c74eadc2f238ef51e16dba0603c89fdb4
                                                                                  • Instruction Fuzzy Hash: 7E02A470900215AFDF14DFA4E9557EEBBB5EF05304F188258E841AB285EF349D85CBB0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • SetUnhandledExceptionFilter.KERNEL32 ref: 00D33544
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                  • String ID:
                                                                                  • API String ID: 3192549508-0
                                                                                  • Opcode ID: bddd7870faf969fc0976618737168fdb562a594b36d77b4507b5b71f5c058f71
                                                                                  • Instruction ID: bd32dcf9bebef354ea77bc685c2827fc25652db6b702fdcba4527a2374ac6061
                                                                                  • Opcode Fuzzy Hash: bddd7870faf969fc0976618737168fdb562a594b36d77b4507b5b71f5c058f71
                                                                                  • Instruction Fuzzy Hash:
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 144 d19730-d19781 call d20c94 147 d19783 144->147 148 d19785-d197e3 call d20ed6 144->148 147->148 151 d197e9-d1980c call d1f544 148->151 152 d198ff-d1998c call d1d362 call d20df9 call d18040 call d19730 148->152 158 d19810-d19814 151->158 179 d19991-d1999e 152->179 160 d19830-d19832 158->160 161 d19816-d19818 158->161 165 d19835-d19837 160->165 163 d1981a-d19820 161->163 164 d1982c-d1982e 161->164 163->160 169 d19822-d1982a 163->169 164->165 166 d19839-d1983d 165->166 167 d1983f-d1984a call d1f57a 165->167 170 d198b7-d198d5 call d19510 166->170 173 d1984f-d19860 167->173 169->158 169->164 182 d198d7-d198e8 170->182 183 d198eb-d198f5 170->183 176 d19862 173->176 177 d19864-d1986c 173->177 176->177 180 d198b4 177->180 181 d1986e-d19870 177->181 184 d199a0-d199ab 179->184 185 d199c5-d199f2 call d32937 179->185 180->170 186 d19872-d19878 call d36c83 181->186 187 d1987b-d19884 181->187 183->152 201 d198f7-d198fb 183->201 188 d199ba-d199bc 184->188 189 d199ad-d199b8 184->189 186->187 187->180 193 d19886-d1988b 187->193 188->185 194 d199be-d199bf LocalFree 188->194 189->188 192 d199f5-d19a87 call d37027 189->192 206 d19a89-d19a8d 192->206 207 d19a8f-d19a95 192->207 199 d19896-d198a7 call d3b7c6 193->199 200 d1988d 193->200 194->185 199->180 208 d198a9-d198b1 call d341e0 199->208 203 d19890-d19894 200->203 201->152 203->199 203->203 209 d19a99-d19a9e 206->209 207->209 208->180 211 d19aa0-d19aac 209->211 213 d19ae0-d19aea call d11bd0 211->213 214 d19aae-d19ac6 211->214 218 d19aef-d19b15 call d41144 213->218 215 d19ad8-d19ade 214->215 216 d19ac8-d19ad5 214->216 215->218 216->215 221 d19b17-d19b19 218->221 222 d19b1b-d19b22 218->222 221->211 223 d19b24-d19b2a 222->223 224 d19b2c-d19b2f 222->224 225 d19b32-d19b43 223->225 224->225 226 d19b45-d19b4a 225->226 227 d19b94-d19bcb call d12e60 call d32937 225->227 228 d19b89 226->228 229 d19b4c-d19b52 226->229 233 d19b8d-d19b92 228->233 231 d19b71-d19b79 229->231 232 d19b54-d19b5b 229->232 238 d19b7c-d19b87 231->238 232->231 236 d19b5d-d19b6f 232->236 233->226 233->227 236->238 238->228 238->233
                                                                                  APIs
                                                                                  • std::locale::_Init.LIBCPMT ref: 00D19763
                                                                                    • Part of subcall function 00D20C94: __EH_prolog3.LIBCMT ref: 00D20C9B
                                                                                    • Part of subcall function 00D20C94: std::_Lockit::_Lockit.LIBCPMT ref: 00D20CA6
                                                                                    • Part of subcall function 00D20C94: std::locale::_Setgloballocale.LIBCPMT ref: 00D20CC1
                                                                                    • Part of subcall function 00D20C94: std::_Lockit::~_Lockit.LIBCPMT ref: 00D20D17
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D1978A
                                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00D197F0
                                                                                  • std::locale::_Locimp::_Makeloc.LIBCPMT ref: 00D1984A
                                                                                    • Part of subcall function 00D1F57A: __EH_prolog3.LIBCMT ref: 00D1F581
                                                                                    • Part of subcall function 00D1F57A: std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00D1F5C8
                                                                                    • Part of subcall function 00D1F57A: std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00D1F620
                                                                                    • Part of subcall function 00D1F57A: std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00D1F654
                                                                                    • Part of subcall function 00D1F57A: std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00D1F6A8
                                                                                  • LocalFree.KERNEL32(00000000,00000000,?,00D654B1,00000000), ref: 00D199BF
                                                                                  • __cftoe.LIBCMT ref: 00D19B0B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::locale::_$Locimp::_$AddfacLocimp_std::_$Lockit$H_prolog3Lockit::_$FreeInitLocalLocinfo::_Locinfo_ctorLockit::~_MakelocSetgloballocale__cftoe
                                                                                  • String ID: bad locale name
                                                                                  • API String ID: 3103716676-1405518554
                                                                                  • Opcode ID: 8161fa3a612e21cb02fa91bfe300768d6e3837109596c34e576bd7296481f798
                                                                                  • Instruction ID: 6ef3c4a4c137b9321d1a27cafb50df424d9d5cff84b0bc9a3651ba52c44b98e9
                                                                                  • Opcode Fuzzy Hash: 8161fa3a612e21cb02fa91bfe300768d6e3837109596c34e576bd7296481f798
                                                                                  • Instruction Fuzzy Hash: A9F19F70904248EFDB14CFA8E9A4BEEFBB5EF09304F144169E845A7381DB759A44CBB0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 285 d472fb-d47307 286 d47399-d4739c 285->286 287 d473a2 286->287 288 d4730c-d4731d 286->288 289 d473a4-d473a8 287->289 290 d4731f-d47322 288->290 291 d4732a-d47343 LoadLibraryExW 288->291 292 d473c2-d473c4 290->292 293 d47328 290->293 294 d47345-d4734e GetLastError 291->294 295 d473a9-d473b9 291->295 292->289 297 d47396 293->297 298 d47387-d47394 294->298 299 d47350-d47362 call d37277 294->299 295->292 296 d473bb-d473bc FreeLibrary 295->296 296->292 297->286 298->297 299->298 302 d47364-d47376 call d37277 299->302 302->298 305 d47378-d47385 LoadLibraryExW 302->305 305->295 305->298
                                                                                  APIs
                                                                                  • FreeLibrary.KERNEL32(00000000,?,00D47408,00D43841,0000000C,?,00000000,00000000,?,00D47632,00000021,FlsSetValue,00D5BD58,00D5BD60,?), ref: 00D473BC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeLibrary
                                                                                  • String ID: api-ms-$ext-ms-
                                                                                  • API String ID: 3664257935-537541572
                                                                                  • Opcode ID: 22c9f838b6fe57ab6fbd2af541a0f1b8ad382058ed3eee24fb37eae6f05c0a6b
                                                                                  • Instruction ID: 1263adde15cb273eb4d36db97b36ce3ecbda4a7572fb589aa02764c97cacdccd
                                                                                  • Opcode Fuzzy Hash: 22c9f838b6fe57ab6fbd2af541a0f1b8ad382058ed3eee24fb37eae6f05c0a6b
                                                                                  • Instruction Fuzzy Hash: 8121D276A09311EBCB219FA5EC49A6A37A89B41771F290110ED61E7390DB70ED00D6F0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 455 d136d0-d1373d GetSystemDirectoryW 456 d13801 455->456 457 d13743-d13748 455->457 459 d13803-d13808 456->459 457->456 458 d1374e-d13757 call d12310 457->458 468 d13851-d1385b call d111d0 458->468 469 d1375d-d1377a call d146f0 458->469 461 d13816-d13818 459->461 462 d1380a-d13814 459->462 463 d13823-d1384e call d32937 461->463 464 d1381a-d13820 GetLastError 461->464 462->461 464->463 476 d1377c-d1377f 469->476 477 d1379e-d137d0 call d14500 * 2 call d33d93 469->477 479 d13782-d1378b 476->479 487 d137d2-d137d4 477->487 488 d137d6-d137e1 LoadLibraryExW 477->488 479->479 481 d1378d-d13799 call d14ac0 479->481 481->477 489 d137e3-d137f5 487->489 488->489 489->459 490 d137f7-d137ff 489->490 490->459
                                                                                  APIs
                                                                                  • GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00D13735
                                                                                  • GetLastError.KERNEL32(?,?,?,00D54215,000000FF), ref: 00D1381A
                                                                                    • Part of subcall function 00D12310: GetProcessHeap.KERNEL32 ref: 00D12365
                                                                                    • Part of subcall function 00D146F0: FindResourceExW.KERNEL32(00000000,00000006,?,00000000,00000000,?,?,?,?,00D13778,-00000010,?,?,?,00D54215,000000FF), ref: 00D14736
                                                                                  • _wcschr.LIBVCRUNTIME ref: 00D137C6
                                                                                  • LoadLibraryExW.KERNELBASE(?,00000000,00000000,?,?,00D54215,000000FF), ref: 00D137DB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: DirectoryErrorFindHeapLastLibraryLoadProcessResourceSystem_wcschr
                                                                                  • String ID: ntdll.dll
                                                                                  • API String ID: 3941625479-2227199552
                                                                                  • Opcode ID: 38bc56faf30dc250c4b513dca0c2a295fafe1f22da384bd5012e87e5e769d8bd
                                                                                  • Instruction ID: 01309638b8257cb6db9572ba2b79f9d34979780500eea28710d5864c55563dee
                                                                                  • Opcode Fuzzy Hash: 38bc56faf30dc250c4b513dca0c2a295fafe1f22da384bd5012e87e5e769d8bd
                                                                                  • Instruction Fuzzy Hash: 144180B1A00605AFDB10DFA8EC45BEEB7A4FF04310F144529E926D72C1EBB09A44CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 492 d369e2-d369ec 493 d36a5d-d36a60 492->493 494 d36a62 493->494 495 d369ee-d369fb 493->495 496 d36a64-d36a68 494->496 497 d36a04-d36a20 LoadLibraryExW 495->497 498 d369fd-d36a00 495->498 501 d36a22-d36a2b GetLastError 497->501 502 d36a69-d36a6f 497->502 499 d36a02 498->499 500 d36a78-d36a7a 498->500 504 d36a5a 499->504 500->496 505 d36a55-d36a58 501->505 506 d36a2d-d36a42 call d37277 501->506 502->500 503 d36a71-d36a72 FreeLibrary 502->503 503->500 504->493 505->504 506->505 509 d36a44-d36a53 LoadLibraryExW 506->509 509->502 509->505
                                                                                  APIs
                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,00D36AA3,?,?,00D6DDCC,00000000,?,00D36BCE,00000004,InitializeCriticalSectionEx,00D597E8,InitializeCriticalSectionEx,00000000), ref: 00D36A72
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeLibrary
                                                                                  • String ID: api-ms-
                                                                                  • API String ID: 3664257935-2084034818
                                                                                  • Opcode ID: 7391e49cde8450611e3a1b914585c5513d3d61acad6d959be2209627b6612420
                                                                                  • Instruction ID: ce98feb7cd5850792f540449dfb8bdbc3fef9ca575d58fa0052589c10cfb5cf0
                                                                                  • Opcode Fuzzy Hash: 7391e49cde8450611e3a1b914585c5513d3d61acad6d959be2209627b6612420
                                                                                  • Instruction Fuzzy Hash: F111A331A04725BBCF228B68AC41B5973A4AF01771F28C260FE55FB380E670EE0086F5
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 510 d46db9-d46dd2 511 d46dd4-d46de4 call d42a4b 510->511 512 d46de8-d46ded 510->512 511->512 518 d46de6 511->518 514 d46dfc-d46e22 call d4a93f 512->514 515 d46def-d46df9 512->515 520 d46f95-d46fa6 call d32937 514->520 521 d46e28-d46e33 514->521 515->514 518->512 523 d46f88 521->523 524 d46e39-d46e3e 521->524 527 d46f8a 523->527 525 d46e40-d46e49 call d33210 524->525 526 d46e53-d46e5e call d45bdc 524->526 535 d46e69-d46e6d 525->535 536 d46e4b-d46e51 525->536 526->535 537 d46e60 526->537 531 d46f8c-d46f93 call d32326 527->531 531->520 535->527 540 d46e73-d46e8a call d4a93f 535->540 539 d46e66 536->539 537->539 539->535 540->527 543 d46e90-d46ea2 call d47831 540->543 545 d46ea7-d46eab 543->545 546 d46ec6-d46ec8 545->546 547 d46ead-d46eb5 545->547 546->527 548 d46eb7-d46ebc 547->548 549 d46eef-d46efb 547->549 550 d46ec2-d46ec4 548->550 551 d46f6e-d46f70 548->551 552 d46efd-d46eff 549->552 553 d46f7a 549->553 550->546 555 d46ecd-d46ee7 call d47831 550->555 551->531 556 d46f14-d46f1f call d45bdc 552->556 557 d46f01-d46f0a call d33210 552->557 554 d46f7c-d46f83 call d32326 553->554 554->546 555->551 567 d46eed 555->567 556->554 566 d46f21 556->566 557->554 568 d46f0c-d46f12 557->568 569 d46f27-d46f2c 566->569 567->546 568->569 569->554 570 d46f2e-d46f46 call d47831 569->570 570->554 573 d46f48-d46f4f 570->573 574 d46f51-d46f52 573->574 575 d46f72-d46f78 573->575 576 d46f53-d46f65 call d4a9bb 574->576 575->576 576->554 579 d46f67-d46f6d call d32326 576->579 579->551
                                                                                  APIs
                                                                                  • __alloca_probe_16.LIBCMT ref: 00D46E40
                                                                                  • __alloca_probe_16.LIBCMT ref: 00D46F01
                                                                                  • __freea.LIBCMT ref: 00D46F68
                                                                                    • Part of subcall function 00D45BDC: RtlAllocateHeap.NTDLL(00000000,00000000,00D43841,?,00D4543A,?,00000000,?,00D36CE7,00000000,00D43841,00000000,?,?,?,00D4363B), ref: 00D45C0E
                                                                                  • __freea.LIBCMT ref: 00D46F7D
                                                                                  • __freea.LIBCMT ref: 00D46F8D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1423051803-0
                                                                                  • Opcode ID: 8f2328c8a308e4e14fae874aa95d2e594098df584c50869e6ee85fe4fd6b98bd
                                                                                  • Instruction ID: cfe2fe9975ef3ae1f91e16f7a1df5d25e99e6f172ef09a1ed3f03eed6d71286d
                                                                                  • Opcode Fuzzy Hash: 8f2328c8a308e4e14fae874aa95d2e594098df584c50869e6ee85fe4fd6b98bd
                                                                                  • Instruction Fuzzy Hash: 35519072A00206AFEF219FA4DC41EBF3AA9EF05750F194129FD46D6251E735DC148B72
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 582 d157c0-d157df GetCurrentProcess OpenProcessToken 583 d157e1-d157e6 582->583 584 d157e7-d15814 GetTokenInformation 582->584 585 d15816-d1581b 584->585 586 d1581e-d1582e CloseHandle 584->586 585->586
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(00000008,?,F83EBEA6,?,-00000010), ref: 00D157D0
                                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00D157D7
                                                                                  • GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?), ref: 00D1580C
                                                                                  • CloseHandle.KERNEL32(?), ref: 00D15822
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                                                  • String ID:
                                                                                  • API String ID: 215268677-0
                                                                                  • Opcode ID: 16100d999469399fa299953f3486169504bb7b28e382edbc949ae7540ffa4ffe
                                                                                  • Instruction ID: cd0ef502c69d42af115e3bc798c5752c13f9bae3a41cab63a572283918b82d37
                                                                                  • Opcode Fuzzy Hash: 16100d999469399fa299953f3486169504bb7b28e382edbc949ae7540ffa4ffe
                                                                                  • Instruction Fuzzy Hash: 0AF0F9B4148301AFEB109F24FC49BAA7BE8BB84701F948819FD84C22A0D779955CDA72
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetCommandLineW.KERNEL32(F83EBEA6,?,?,?,?,?,?,?,?,?,00D556D5,000000FF), ref: 00D1CDE8
                                                                                    • Part of subcall function 00D11F80: LocalAlloc.KERNEL32(00000040,00000000,?,?,vector too long,00D14251,F83EBEA6,00000000,?,00000000,?,?,?,00D54400,000000FF,?), ref: 00D11F9D
                                                                                  • ExitProcess.KERNEL32 ref: 00D1CEB1
                                                                                    • Part of subcall function 00D16600: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00D1667E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocCommandCreateExitFileLineLocalProcess
                                                                                  • String ID: Full command line:
                                                                                  • API String ID: 1878577176-831861440
                                                                                  • Opcode ID: 175e70f95ed389efc216460209472895fe59f833e6e2cc9b1457f51357092c72
                                                                                  • Instruction ID: 3a78ef9acd13de894f5e1b39a09c19c07e8d90608b44d5ee7c77134a0ca52665
                                                                                  • Opcode Fuzzy Hash: 175e70f95ed389efc216460209472895fe59f833e6e2cc9b1457f51357092c72
                                                                                  • Instruction Fuzzy Hash: AC21DE71A20254BBCB15EB60EC56BEE77B5EF44740F144118F802AB296EF749A88C7B1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 619 d15e40-d15ebc GetTokenInformation 620 d15f20-d15f33 619->620 621 d15ebe-d15ec7 GetLastError 619->621 621->620 622 d15ec9-d15ed7 621->622 623 d15ed9-d15edc 622->623 624 d15ede 622->624 625 d15f0b 623->625 626 d15ee0-d15ee7 624->626 627 d15f0e-d15f1a GetTokenInformation 624->627 625->627 628 d15ef7-d15f08 call d34080 626->628 629 d15ee9-d15ef5 call d160d0 626->629 627->620 628->625 629->627
                                                                                  APIs
                                                                                  • GetTokenInformation.KERNELBASE(?,00000001(TokenIntegrityLevel),00000000,00000000,00D15E18,F83EBEA6,?), ref: 00D15EB4
                                                                                  • GetLastError.KERNEL32(?,TokenIntegrityLevel,00000000,00000000,00D15E18,F83EBEA6,?), ref: 00D15EBE
                                                                                  • GetTokenInformation.KERNELBASE(?,00000001(TokenIntegrityLevel),?,00000000,00000000,?,TokenIntegrityLevel,00000000,00000000,00D15E18,F83EBEA6,?), ref: 00D15F1A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: InformationToken$ErrorLast
                                                                                  • String ID:
                                                                                  • API String ID: 2567405617-0
                                                                                  • Opcode ID: 8171796db47c06a5fc839a842a9e9af0f9db9ecaf03dad0ab71754602e896225
                                                                                  • Instruction ID: de90742d0eeaefbdc08ff73c54e14dd15022a625dec88f59f3c6ba0c8790faa2
                                                                                  • Opcode Fuzzy Hash: 8171796db47c06a5fc839a842a9e9af0f9db9ecaf03dad0ab71754602e896225
                                                                                  • Instruction Fuzzy Hash: B5317C71A00605EFDB14CF98EC45BAFBBF9FB84710F20452AF415E7284DBB5A9448BA0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 634 d4b860-d4b888 call d4b390 637 d4ba50-d4ba51 call d4b401 634->637 638 d4b88e-d4b894 634->638 641 d4ba56-d4ba58 637->641 640 d4b897-d4b89d 638->640 642 d4b8a3-d4b8af 640->642 643 d4b99f-d4b9be call d34080 640->643 644 d4ba59-d4ba67 call d32937 641->644 642->640 645 d4b8b1-d4b8b7 642->645 651 d4b9c1-d4b9c6 643->651 649 d4b997-d4b99a 645->649 650 d4b8bd-d4b8c9 IsValidCodePage 645->650 649->644 650->649 653 d4b8cf-d4b8d6 650->653 654 d4ba03-d4ba0d 651->654 655 d4b9c8-d4b9cd 651->655 656 d4b8fe-d4b90b GetCPInfo 653->656 657 d4b8d8-d4b8e4 653->657 654->651 660 d4ba0f-d4ba39 call d4b352 654->660 658 d4ba00 655->658 659 d4b9cf-d4b9d7 655->659 662 d4b90d-d4b92c call d34080 656->662 663 d4b98b-d4b991 656->663 661 d4b8e8-d4b8f4 call d4b464 657->661 658->654 664 d4b9f8-d4b9fe 659->664 665 d4b9d9-d4b9dc 659->665 675 d4ba3a-d4ba49 660->675 672 d4b8f9 661->672 662->661 673 d4b92e-d4b935 662->673 663->637 663->649 664->655 664->658 670 d4b9de-d4b9e4 665->670 670->664 674 d4b9e6-d4b9f6 670->674 672->641 676 d4b937-d4b93c 673->676 677 d4b961-d4b964 673->677 674->664 674->670 675->675 678 d4ba4b 675->678 676->677 679 d4b93e-d4b946 676->679 680 d4b969-d4b970 677->680 678->637 681 d4b948-d4b94f 679->681 682 d4b959-d4b95f 679->682 680->680 683 d4b972-d4b986 call d4b352 680->683 684 d4b950-d4b957 681->684 682->676 682->677 683->661 684->682 684->684
                                                                                  APIs
                                                                                    • Part of subcall function 00D4B390: GetOEMCP.KERNEL32(00000000,?,?,?,?), ref: 00D4B3BB
                                                                                  • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,00D4B6A7,?,00000000,?,?,?), ref: 00D4B8C1
                                                                                  • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,00D4B6A7,?,00000000,?,?,?), ref: 00D4B903
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: CodeInfoPageValid
                                                                                  • String ID:
                                                                                  • API String ID: 546120528-0
                                                                                  • Opcode ID: 10e93eef763c7a98ac47894edd12aca4e95f27db5ccc60761031996de107e084
                                                                                  • Instruction ID: 0cc49fe49b010fcc61a3b0ff27ce57cc0a3955ef788aad7937ef55d1aed2e18a
                                                                                  • Opcode Fuzzy Hash: 10e93eef763c7a98ac47894edd12aca4e95f27db5ccc60761031996de107e084
                                                                                  • Instruction Fuzzy Hash: E851E070A003459FDB20CF76C881AAABBE4EF65324F18456FD18687252D7B5E946CFB0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 687 d32096-d320a0 688 d42a07-d42a0e call d4ab40 687->688 689 d320a6-d320c4 RtlEncodePointer 687->689 692 d42a10-d42a17 call d4ab85 688->692 693 d42a18-d42a1f 688->693 692->693 695 d42a21-d42a2b IsProcessorFeaturePresent 693->695 696 d42a43-d42a4a call d42e9d 693->696 698 d42a32-d42a40 call d36e1b 695->698 699 d42a2d-d42a30 695->699 698->696 699->698
                                                                                  APIs
                                                                                  • RtlEncodePointer.NTDLL(?,?,00D20E39,00D20E7F,?,00D20CC6,00000000,00000000,00000000,00000004,00D19768,00000000,F83EBEA6,?,?), ref: 00D320A9
                                                                                  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00D42A23
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: EncodeFeaturePointerPresentProcessor
                                                                                  • String ID:
                                                                                  • API String ID: 4030241255-0
                                                                                  • Opcode ID: a0cead2c01ca200f84056e76271e11f25b5302a99a7fd3b5f3310f711267a17e
                                                                                  • Instruction ID: dcc1d2ce93fd55d061e910639cf6a84edee77b6503a79741c253b3268d5fdc98
                                                                                  • Opcode Fuzzy Hash: a0cead2c01ca200f84056e76271e11f25b5302a99a7fd3b5f3310f711267a17e
                                                                                  • Instruction Fuzzy Hash: 8EF0B470284705EBE725BB14FC0BB303B58DB14705F588029FE48E82E2DAB08441CA32
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 704 d35a0a-d35a0f call d36ac5 706 d35a14-d35a1d 704->706 707 d35a22-d35a31 call d36b76 706->707 708 d35a1f-d35a21 706->708 711 d35a33-d35a38 call d35a3d 707->711 712 d35a3a-d35a3c 707->712 711->708
                                                                                  APIs
                                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00D35A28
                                                                                  • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00D35A33
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value___vcrt____vcrt_uninitialize_ptd
                                                                                  • String ID:
                                                                                  • API String ID: 1660781231-0
                                                                                  • Opcode ID: 23a23881630025d7106eebc979a0781bfdc7751a1dc309a96ef77ac9fb994acf
                                                                                  • Instruction ID: c927d6f9d7f4b6a2b0f32d79b0bba167e7bdf7b99a9da74d83177b79b7d8c1d7
                                                                                  • Opcode Fuzzy Hash: 23a23881630025d7106eebc979a0781bfdc7751a1dc309a96ef77ac9fb994acf
                                                                                  • Instruction Fuzzy Hash: 7DD02230558F00AD0E007670BC8396823408E027BCFA4E386F020C79CAFE20E4087D32
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D2866D
                                                                                  • _Getvals.LIBCPMT ref: 00D28689
                                                                                    • Part of subcall function 00D21DA1: std::_Locinfo::_W_Getdays.LIBCPMT ref: 00D21DC3
                                                                                    • Part of subcall function 00D21DA1: std::_Locinfo::_W_Getmonths.LIBCPMT ref: 00D21DD5
                                                                                    • Part of subcall function 00D323F8: GetLocaleInfoEx.KERNEL32(?,00000022,00000000,00000002,?,?,00D300E2,00000000,00000000,00000004,00D2ED14,00000000,00000004,00D2F127,00000000,00000000), ref: 00D32410
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Locinfo::_std::_$GetdaysGetmonthsGetvalsH_prolog3InfoLocale
                                                                                  • String ID:
                                                                                  • API String ID: 3247073284-0
                                                                                  • Opcode ID: 57b7a81ea20d531140a11f847abbccef67751b4c8d7acb00c3ef55aa96bb362b
                                                                                  • Instruction ID: 90652d4181237fc8a9806dc0578d7c3b0227f25e83f26010a238956461b88d8c
                                                                                  • Opcode Fuzzy Hash: 57b7a81ea20d531140a11f847abbccef67751b4c8d7acb00c3ef55aa96bb362b
                                                                                  • Instruction Fuzzy Hash: 69E0B6B5D007509FDB64EFB4950162EBAE1EB14310B10892EA959D7602D77496048BB5
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • GetCPInfo.KERNEL32(E8458D00,?,00D4B6B3,00D4B6A7,00000000), ref: 00D4B496
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Info
                                                                                  • String ID:
                                                                                  • API String ID: 1807457897-0
                                                                                  • Opcode ID: 736b48a4813aebaab1d925f77713f393216b9f17c63dc0ae5a137c99776b8b01
                                                                                  • Instruction ID: d243bf5d83af5bab089c5dafed1582001518bed7a3215a86f2014131bd4f06d6
                                                                                  • Opcode Fuzzy Hash: 736b48a4813aebaab1d925f77713f393216b9f17c63dc0ae5a137c99776b8b01
                                                                                  • Instruction Fuzzy Hash: EE5109719082589BDB218F28CD80AE6BBB8EB65324F2405AAE5DAD7142D335DD46DF30
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 048ed38e7db160375a75e73b8eceea5ed11a1927d7f46c4050e4e8e5dc9dfb3c
                                                                                  • Instruction ID: b61d5c8e17481053e31aa0665541147d2daff83cc31af03d00c7f7a79234eff9
                                                                                  • Opcode Fuzzy Hash: 048ed38e7db160375a75e73b8eceea5ed11a1927d7f46c4050e4e8e5dc9dfb3c
                                                                                  • Instruction Fuzzy Hash: A901D837718311AF9F16DE7DEC40A6A37D6EB897607249120F954DB254DB30D801D7B1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • RtlAllocateHeap.NTDLL(00000008,?,?,?,00D4596A,00000001,00000364,?,00000004,000000FF,?,00D36CE7,00000000,00D43841,00000000), ref: 00D470FC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1279760036-0
                                                                                  • Opcode ID: 7eea66514cc2d93d42a80de058a66f2695512c49b55d304f94b8354f0e854f32
                                                                                  • Instruction ID: 918a15361e3da4e887bbe05bc15e6cfcee05853fca1ca34a277587127559a15c
                                                                                  • Opcode Fuzzy Hash: 7eea66514cc2d93d42a80de058a66f2695512c49b55d304f94b8354f0e854f32
                                                                                  • Instruction Fuzzy Hash: 42F0E23124E7646B9B325A269C01B5B77ADEF517B1B184022FC58EA190CBA0EC0086F1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • GetProcAddress.KERNEL32(00000000,?,00D6DDCC,00000000,?,00D36BCE,00000004,InitializeCriticalSectionEx,00D597E8,InitializeCriticalSectionEx,00000000,?,00D3698D,00D6DDCC,00000FA0,00000000), ref: 00D36AAD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc
                                                                                  • String ID:
                                                                                  • API String ID: 190572456-0
                                                                                  • Opcode ID: 4eab16ed76a313d52732e9a16894d9edfb551aaf4598899af2e4bd73b8c98294
                                                                                  • Instruction ID: eb6c39714a6f27d2a9e7f17b7319e7a7e10677137f1a104cffe906a2ac4409ef
                                                                                  • Opcode Fuzzy Hash: 4eab16ed76a313d52732e9a16894d9edfb551aaf4598899af2e4bd73b8c98294
                                                                                  • Instruction Fuzzy Hash: 8EF08C36304316AF8F129EA9AC0089A77A9EF00720F28C024FD14E7290EB31D9208BB0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • RtlAllocateHeap.NTDLL(00000000,00000000,00D43841,?,00D4543A,?,00000000,?,00D36CE7,00000000,00D43841,00000000,?,?,?,00D4363B), ref: 00D45C0E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1279760036-0
                                                                                  • Opcode ID: 7087639666ce4164c046206c6455ca34608aa9b3bfdb4caaa9998d4100d7405d
                                                                                  • Instruction ID: a4175df7f57a9fcc2228efc355ee48d5a2ca52ac850d14318c8bf5e6962d71e8
                                                                                  • Opcode Fuzzy Hash: 7087639666ce4164c046206c6455ca34608aa9b3bfdb4caaa9998d4100d7405d
                                                                                  • Instruction Fuzzy Hash: 0DE0ED21204F215BD6312AA9BD81B9A379CEF127A1F190221FC96D62DBCB60CC0089F9
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 00D20DF9: std::locale::_Locimp::_Locimp.LIBCPMT ref: 00D20E11
                                                                                    • Part of subcall function 00D19730: std::locale::_Init.LIBCPMT ref: 00D19763
                                                                                    • Part of subcall function 00D19730: std::_Lockit::_Lockit.LIBCPMT ref: 00D1978A
                                                                                    • Part of subcall function 00D19730: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00D197F0
                                                                                  • LocalFree.KERNEL32(00000000,00000000,?,00D654B1,00000000), ref: 00D199BF
                                                                                  • __cftoe.LIBCMT ref: 00D19B0B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_std::locale::_$FreeInitLocalLocimpLocimp::_Locinfo::_Locinfo_ctorLockitLockit::___cftoe
                                                                                  • String ID:
                                                                                  • API String ID: 810108568-0
                                                                                  • Opcode ID: bb141986e259aac4dc8fe8379f619c792e2170b63b62c5c88cfa8aa51c24c1ad
                                                                                  • Instruction ID: ae0c7c7169b5c150edf524e9bf00e8f7b302c00492d22179e87b7bd884fe70c5
                                                                                  • Opcode Fuzzy Hash: bb141986e259aac4dc8fe8379f619c792e2170b63b62c5c88cfa8aa51c24c1ad
                                                                                  • Instruction Fuzzy Hash: 182180B09042499FEB04DF98D969BEEFBB5EB08710F24011DE415A73C0DB795A88CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 00D45BDC: RtlAllocateHeap.NTDLL(00000000,00000000,00D43841,?,00D4543A,?,00000000,?,00D36CE7,00000000,00D43841,00000000,?,?,?,00D4363B), ref: 00D45C0E
                                                                                  • HeapReAlloc.KERNEL32(00000000,00000000,?,00D43841,00000000,?,00D36CE7,00000000,00D43841,00000000,?,?,?,00D4363B,?,00000000), ref: 00D45482
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$AllocAllocate
                                                                                  • String ID:
                                                                                  • API String ID: 2177240990-0
                                                                                  • Opcode ID: 7d712a7dd82f98d303af2ebced1542e12c9eb4c37c4279508b30351204a55386
                                                                                  • Instruction ID: 220adb0ff346e407ea3f12a6d006538a103d6b2830beeb048576451745cc249c
                                                                                  • Opcode Fuzzy Hash: 7d712a7dd82f98d303af2ebced1542e12c9eb4c37c4279508b30351204a55386
                                                                                  • Instruction Fuzzy Hash: 0BF0C232200E1967CB212A25BC00B6B2758CF827B2B2C8016F95DAE1ABDA70C98081B1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • GetWindowsDirectoryW.KERNEL32(?,00000104,00000000,?,?,?,?,?), ref: 00D1549C
                                                                                  • GetForegroundWindow.USER32 ref: 00D1551D
                                                                                  • ShellExecuteExW.SHELL32(?), ref: 00D15601
                                                                                  • ShellExecuteExW.SHELL32(?), ref: 00D15637
                                                                                  • GetModuleHandleW.KERNEL32(Kernel32.dll,GetProcessId,?,?,?,?,?,?), ref: 00D1567C
                                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,?,?), ref: 00D15685
                                                                                  • AllowSetForegroundWindow.USER32(00000000), ref: 00D1568B
                                                                                  • GetModuleHandleW.KERNEL32(Kernel32.dll,GetProcessId,?,?,?,?,?,?), ref: 00D156AB
                                                                                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,?,?), ref: 00D156AE
                                                                                  • Sleep.KERNEL32(00000064,?,?,?,?,?,?), ref: 00D156CA
                                                                                  • EnumWindows.USER32(00D15830,?), ref: 00D156DF
                                                                                  • BringWindowToTop.USER32(00000000), ref: 00D156F4
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?), ref: 00D15711
                                                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00D1571B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$AddressExecuteForegroundHandleModuleProcShellWindows$AllowBringCodeDirectoryEnumExitObjectProcessSingleSleepWait
                                                                                  • String ID: %s\System32\cmd.exe$.bat$.cmd$/C ""%s" %s"$Directory:<$FilePath:<$GetProcessId$Hidden$Kernel32.dll$Parameters:<$ShellExecuteInfo members:$Verb:<$Visible$Window Visibility:$open$runas
                                                                                  • API String ID: 697762045-2796270252
                                                                                  • Opcode ID: 3f5bac6a8d6f938b552b2a0c6c20bc91335c29628a62f5ad718a4148bc158197
                                                                                  • Instruction ID: 075d2973f3cd5eb08941fdecedc970b41898a5e86d3e62da04413e7b13839fe3
                                                                                  • Opcode Fuzzy Hash: 3f5bac6a8d6f938b552b2a0c6c20bc91335c29628a62f5ad718a4148bc158197
                                                                                  • Instruction Fuzzy Hash: E9E1A271A00B05EBCB10DFA4E844BEEB7B1EF85710F584169E815AB399DB389D85CB70
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • RegOpenKeyExW.ADVAPI32 ref: 00D1CBB6
                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00D6E6D0,00000800), ref: 00D1CBD3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: OpenQueryValue
                                                                                  • String ID: /DIR $/DontWait $/EnforcedRunAsAdmin $/HideWindow$/LogFile$/RunAsAdmin
                                                                                  • API String ID: 4153817207-482544602
                                                                                  • Opcode ID: 66422456219bec6796f08a0d3e1c5af975abf17f1de70f4e94d30adf8830a625
                                                                                  • Instruction ID: bd414ecf640c694af2ea5fd43afbade4a5b9ed0f807bc2f9fd47347b613e103d
                                                                                  • Opcode Fuzzy Hash: 66422456219bec6796f08a0d3e1c5af975abf17f1de70f4e94d30adf8830a625
                                                                                  • Instruction Fuzzy Hash: 67C1C1356A4216AACB359F14F4012FA73A2EF90740F5C6459E88ADB294EF70CDC1C7B1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 00D457CC: GetLastError.KERNEL32(?,00000008,00D4AD4C), ref: 00D457D0
                                                                                    • Part of subcall function 00D457CC: SetLastError.KERNEL32(00000000,00000000,00000004,000000FF), ref: 00D45872
                                                                                  • GetACP.KERNEL32(?,?,?,?,?,?,00D442D9,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00D4DEE5
                                                                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00D442D9,?,?,?,00000055,?,-00000050,?,?), ref: 00D4DF10
                                                                                  • _wcschr.LIBVCRUNTIME ref: 00D4DFA4
                                                                                  • _wcschr.LIBVCRUNTIME ref: 00D4DFB2
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00D4E073
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid
                                                                                  • String ID: utf8
                                                                                  • API String ID: 4147378913-905460609
                                                                                  • Opcode ID: 3e3b048905023c0512739791ea8b001f2d3df554d1737ff265e12145c1406b43
                                                                                  • Instruction ID: 52ff195b61393a37d5353f29a92648a3ce9f4ec55cfe6b722d5467d487f21ec5
                                                                                  • Opcode Fuzzy Hash: 3e3b048905023c0512739791ea8b001f2d3df554d1737ff265e12145c1406b43
                                                                                  • Instruction Fuzzy Hash: 6771D171A00706ABDB24AB75DC86BBB73A9EF14700F184439F956DB181EBB4E940CB71
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: __floor_pentium4
                                                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                  • API String ID: 4168288129-2761157908
                                                                                  • Opcode ID: 4c3ec9692b54b778a77fe6793857979dd749596a0ea1610cdefe315c91802e15
                                                                                  • Instruction ID: 3698741d7889152c61f5c18ffad0d039e83aa8aef7e29c632c3015a3c05a6c02
                                                                                  • Opcode Fuzzy Hash: 4c3ec9692b54b778a77fe6793857979dd749596a0ea1610cdefe315c91802e15
                                                                                  • Instruction Fuzzy Hash: 72D22972E082288FDB65CF28DD407EAB7B5EB44305F1841EAD84DE7250E774AE858F61
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • GetLocaleInfoW.KERNEL32(?,2000000B,00D4E8D1,00000002,00000000,?,?,?,00D4E8D1,?,00000000), ref: 00D4E64C
                                                                                  • GetLocaleInfoW.KERNEL32(?,20001004,00D4E8D1,00000002,00000000,?,?,?,00D4E8D1,?,00000000), ref: 00D4E675
                                                                                  • GetACP.KERNEL32(?,?,00D4E8D1,?,00000000), ref: 00D4E68A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID: ACP$OCP
                                                                                  • API String ID: 2299586839-711371036
                                                                                  • Opcode ID: 3ded65032ce266ef3c78480abc672a38e59c48063fd9daf4e0a4b50076d49b94
                                                                                  • Instruction ID: 0307b112424314f389379b8f0a5cda87800191e5fa2f7f1e675293023b481610
                                                                                  • Opcode Fuzzy Hash: 3ded65032ce266ef3c78480abc672a38e59c48063fd9daf4e0a4b50076d49b94
                                                                                  • Instruction Fuzzy Hash: 82216A22B00200BBDB34CF24C905AA7B7A6BF64B65F5B8864ED4AD7214EB32DD40C770
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: _swprintf$FreeLocal
                                                                                  • String ID:
                                                                                  • API String ID: 2429749586-0
                                                                                  • Opcode ID: 833f08989ead5d8a4cb149ab238aee6055d37603299272aa2888134f396d0fc9
                                                                                  • Instruction ID: e07eada19ebaff8e33e8a093ad6f0529fccf9f29fbc7d36ef7c75b27c2c4ace8
                                                                                  • Opcode Fuzzy Hash: 833f08989ead5d8a4cb149ab238aee6055d37603299272aa2888134f396d0fc9
                                                                                  • Instruction Fuzzy Hash: D3F19B71D10219ABDF14DFA8EC50BEEBBB5FF48310F144229F911A7280DB35A9818BB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 00D457CC: GetLastError.KERNEL32(?,00000008,00D4AD4C), ref: 00D457D0
                                                                                    • Part of subcall function 00D457CC: SetLastError.KERNEL32(00000000,00000000,00000004,000000FF), ref: 00D45872
                                                                                  • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00D4E894
                                                                                  • IsValidCodePage.KERNEL32(00000000), ref: 00D4E8DD
                                                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 00D4E8EC
                                                                                  • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00D4E934
                                                                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00D4E953
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                  • String ID:
                                                                                  • API String ID: 415426439-0
                                                                                  • Opcode ID: 4b39d2e2cb144d1127058e928ecfc3923a86953b1f3a238d4178cce95333b9bb
                                                                                  • Instruction ID: 9bd5a038c0d053ee7c69000ea7c2dbae28353c1ddbb4edd27284f1a7805d3640
                                                                                  • Opcode Fuzzy Hash: 4b39d2e2cb144d1127058e928ecfc3923a86953b1f3a238d4178cce95333b9bb
                                                                                  • Instruction Fuzzy Hash: DD512A71A00319BFEF20DFA5DC45ABAB7B8FF88701F184469E950E7191E77099448BB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: _strrchr
                                                                                  • String ID:
                                                                                  • API String ID: 3213747228-0
                                                                                  • Opcode ID: c088d6f79354faf8b1bce494a29b4de1bf964f76c3977490bbe1990304a04063
                                                                                  • Instruction ID: 484aa4fac37f2da1ea9537954a887693b2c5f63cc616385efbda5c4f5cb46059
                                                                                  • Opcode Fuzzy Hash: c088d6f79354faf8b1bce494a29b4de1bf964f76c3977490bbe1990304a04063
                                                                                  • Instruction Fuzzy Hash: 59B177729046459FDF15CF68C881BEEBBE5EF1A300F18816AE841AB346D235DD05CBB2
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00D333B4
                                                                                  • IsDebuggerPresent.KERNEL32 ref: 00D33480
                                                                                  • SetUnhandledExceptionFilter.KERNEL32 ref: 00D334A0
                                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 00D334AA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                  • String ID:
                                                                                  • API String ID: 254469556-0
                                                                                  • Opcode ID: 4c2b0a19072e5310d8015f2fd2c9b1df85665060fec095bceb6f2ec9914471a3
                                                                                  • Instruction ID: 9affc74a23b7738f81ea2dafef67f05f26109806099c7c8575277aa7ba582180
                                                                                  • Opcode Fuzzy Hash: 4c2b0a19072e5310d8015f2fd2c9b1df85665060fec095bceb6f2ec9914471a3
                                                                                  • Instruction Fuzzy Hash: BC314775D053189BDB11DFA4DA89BCCBBB8AF08304F1040AAE50CAB250EB759B858F64
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 00D1C630: InitializeCriticalSectionEx.KERNEL32(?,00000000,00000000,F83EBEA6,?,00D53D30,000000FF), ref: 00D1C657
                                                                                    • Part of subcall function 00D1C630: GetLastError.KERNEL32(?,00000000,00000000,F83EBEA6,?,00D53D30,000000FF), ref: 00D1C661
                                                                                  • IsDebuggerPresent.KERNEL32(?,?,00D68AF0), ref: 00D1D0D8
                                                                                  • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,00D68AF0), ref: 00D1D0E7
                                                                                  Strings
                                                                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00D1D0E2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalDebugDebuggerErrorInitializeLastOutputPresentSectionString
                                                                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                  • API String ID: 3511171328-631824599
                                                                                  • Opcode ID: 27dff9f266873cb6a1a7397572bd341e0c50c888752f792b0de50ee3c567fbf0
                                                                                  • Instruction ID: 61486fe48bfcb74c241cff1e13a563c3ce39c925b20f87330bac33313e1956db
                                                                                  • Opcode Fuzzy Hash: 27dff9f266873cb6a1a7397572bd341e0c50c888752f792b0de50ee3c567fbf0
                                                                                  • Instruction Fuzzy Hash: 92E06D702047519FD320AF68F4047867BE4AB28341F14885CEC59C2790DFB4E4CD8BB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 00D457CC: GetLastError.KERNEL32(?,00000008,00D4AD4C), ref: 00D457D0
                                                                                    • Part of subcall function 00D457CC: SetLastError.KERNEL32(00000000,00000000,00000004,000000FF), ref: 00D45872
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00D4E28B
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00D4E2D5
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00D4E39B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale$ErrorLast
                                                                                  • String ID:
                                                                                  • API String ID: 661929714-0
                                                                                  • Opcode ID: 17e118d8c8e3882bf60a38bcdfe72468dc4be8f9d1d6a5451a3e172469c84f14
                                                                                  • Instruction ID: 2ba31367c42e4530e16c24df82d8c787cf62e3672ac1af8b8f7fad0f3decadef
                                                                                  • Opcode Fuzzy Hash: 17e118d8c8e3882bf60a38bcdfe72468dc4be8f9d1d6a5451a3e172469c84f14
                                                                                  • Instruction Fuzzy Hash: 22619071500617AFEB299F24CC86BBA77A8FF14311F184179E909C7285E778E985CB70
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00D36F13
                                                                                  • SetUnhandledExceptionFilter.KERNEL32 ref: 00D36F1D
                                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 00D36F2A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                  • String ID:
                                                                                  • API String ID: 3906539128-0
                                                                                  • Opcode ID: fa78b4d68b76d17be60feaba681e38c654fe40b907ac50e9ee721e5b2eba8a82
                                                                                  • Instruction ID: 3e4251dc0ed6fa2d76a7e19253d43e66572c8cd0674d4cc40b8f9ba46a2f6b68
                                                                                  • Opcode Fuzzy Hash: fa78b4d68b76d17be60feaba681e38c654fe40b907ac50e9ee721e5b2eba8a82
                                                                                  • Instruction Fuzzy Hash: 7D31D474901318ABCB21DF64D988B8DBBB8FF08310F5041EAE41CA7250E7709B818F64
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • LoadResource.KERNEL32(00000000,00000000,F83EBEA6,00000001,00000000,?,00000000,00D54460,000000FF,?,00D1474D,00D13778,?,00000000,00000000,?), ref: 00D145DB
                                                                                  • LockResource.KERNEL32(00000000,?,00000000,00D54460,000000FF,?,00D1474D,00D13778,?,00000000,00000000,?,?,?,?,00D13778), ref: 00D145E6
                                                                                  • SizeofResource.KERNEL32(00000000,00000000,?,00000000,00D54460,000000FF,?,00D1474D,00D13778,?,00000000,00000000,?,?,?), ref: 00D145F4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Resource$LoadLockSizeof
                                                                                  • String ID:
                                                                                  • API String ID: 2853612939-0
                                                                                  • Opcode ID: 4ab8f2b6cf7ad033a850efad0f5a7603909997e0bf56ef5f229cc899f172a68d
                                                                                  • Instruction ID: 6c3051d2ff1694d54a2eb17ee396e4a1fe48df59f1d3056b756625a4b294eaf1
                                                                                  • Opcode Fuzzy Hash: 4ab8f2b6cf7ad033a850efad0f5a7603909997e0bf56ef5f229cc899f172a68d
                                                                                  • Instruction Fuzzy Hash: F711A732A04654ABC7358F59EC44BE6B7F8E785719F14052AEC19D3380EA759C4486B0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c3b8607f755f17a23646f2bf370a959f638319f8f7f89048cc653de111095432
                                                                                  • Instruction ID: 7afeceed0cff0c079f65a10166e0b5c3f3a825fb9c5ae613c758b3ca7f074643
                                                                                  • Opcode Fuzzy Hash: c3b8607f755f17a23646f2bf370a959f638319f8f7f89048cc653de111095432
                                                                                  • Instruction Fuzzy Hash: D1F13F71E012199FDF14CFA8C9806ADB7B1FF98324F198669E815A73C1D730AD05CBA0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • GetTimeZoneInformation.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00D47F64,00000000,00000000,00000000), ref: 00D47E23
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: InformationTimeZone
                                                                                  • String ID:
                                                                                  • API String ID: 565725191-0
                                                                                  • Opcode ID: cf33aa62f14b767a5a61797bbde638942fb7eec6a92cd1638d6e939feda2de42
                                                                                  • Instruction ID: d61afd99afc6afbf33ad8ee118f853c646fcb5d09f26d8a05016e75347397c9c
                                                                                  • Opcode Fuzzy Hash: cf33aa62f14b767a5a61797bbde638942fb7eec6a92cd1638d6e939feda2de42
                                                                                  • Instruction Fuzzy Hash: 60C11672E04215ABDB24AF64DC02ABE7BB9EF04750F584066F941EB291F7709E41CBB0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00D484B8,?,?,00000008,?,?,00D514E4,00000000), ref: 00D486EA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionRaise
                                                                                  • String ID:
                                                                                  • API String ID: 3997070919-0
                                                                                  • Opcode ID: a0dd34b348e1abfbce755151d737b8d3a274d711042f50f895a0e4f7f83ce3bd
                                                                                  • Instruction ID: 3887b7ccb99211fb5404c03828ecd09528eba7facde21396f137d689c0898f2c
                                                                                  • Opcode Fuzzy Hash: a0dd34b348e1abfbce755151d737b8d3a274d711042f50f895a0e4f7f83ce3bd
                                                                                  • Instruction Fuzzy Hash: 76B16D31610608CFD715CF28C49AB687BE0FF453A5F298658E8DACF2A1CB35E981DB50
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00D335BF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: FeaturePresentProcessor
                                                                                  • String ID:
                                                                                  • API String ID: 2325560087-0
                                                                                  • Opcode ID: a2a78e96e99d4e91841ad39d39e7f4bd018718f8c8ca5ab778419f20d94e6b52
                                                                                  • Instruction ID: 19a8cd9e43e8bc1c44f4ce8e1c3fb32e083528edd680d31fed3767cf0911cc3a
                                                                                  • Opcode Fuzzy Hash: a2a78e96e99d4e91841ad39d39e7f4bd018718f8c8ca5ab778419f20d94e6b52
                                                                                  • Instruction Fuzzy Hash: F05149B1A143159FEB25CF59E9817AABBF1FB44354F28852AD405EB350D3B59A00CF70
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 247b5e3547bfb1266486f237e50a606736d9faa5349c41c05299f08b650abe4d
                                                                                  • Instruction ID: 099751aa7c439ca006b4466514b66d004fc5cf7d5f3f16ccb14bceaf0a221707
                                                                                  • Opcode Fuzzy Hash: 247b5e3547bfb1266486f237e50a606736d9faa5349c41c05299f08b650abe4d
                                                                                  • Instruction Fuzzy Hash: BB31B276900219AFCB20DFA8CC859BBB77DEB85351F184159F91597240EA30EE448B70
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 0
                                                                                  • API String ID: 0-4108050209
                                                                                  • Opcode ID: 8b3582d752a9892e37588021e30282540cfe27c7c5dd136deb97b398bf7917c5
                                                                                  • Instruction ID: 95874b7eec1bfaa9006e0eaa4a1c57e0c520ed4741949cc692eeccde2ff9894f
                                                                                  • Opcode Fuzzy Hash: 8b3582d752a9892e37588021e30282540cfe27c7c5dd136deb97b398bf7917c5
                                                                                  • Instruction Fuzzy Hash: 37C18CB4B00A468FCB28CF2CC495ABABBB1AF45310F2C4619D5D697291C731ED46CB72
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 00D457CC: GetLastError.KERNEL32(?,00000008,00D4AD4C), ref: 00D457D0
                                                                                    • Part of subcall function 00D457CC: SetLastError.KERNEL32(00000000,00000000,00000004,000000FF), ref: 00D45872
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00D4E4DE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$InfoLocale
                                                                                  • String ID:
                                                                                  • API String ID: 3736152602-0
                                                                                  • Opcode ID: 857e13bb820f54a1f92c3a720eda38655cec050f9a3bd1611d3c64c198d88ffb
                                                                                  • Instruction ID: 26879e3f955cac00eab81d31c3fab1c4fe9504034e299413ba4c2fb2810c32d1
                                                                                  • Opcode Fuzzy Hash: 857e13bb820f54a1f92c3a720eda38655cec050f9a3bd1611d3c64c198d88ffb
                                                                                  • Instruction Fuzzy Hash: 90218E72654206BBDB289F29DC42BBA77A8FF04718F14017AF905D6241FB74ED008B70
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 00D457CC: GetLastError.KERNEL32(?,00000008,00D4AD4C), ref: 00D457D0
                                                                                    • Part of subcall function 00D457CC: SetLastError.KERNEL32(00000000,00000000,00000004,000000FF), ref: 00D45872
                                                                                  • EnumSystemLocalesW.KERNEL32(00D4E237,00000001,00000000,?,-00000050,?,00D4E868,00000000,?,?,?,00000055,?), ref: 00D4E183
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                                  • String ID:
                                                                                  • API String ID: 2417226690-0
                                                                                  • Opcode ID: 5eb77c68aeb284640efe8db6decb9df9f45602fa61969d6ccdef9081f9bd5a7e
                                                                                  • Instruction ID: 204864b332279ec93d6a76e73c44be6edc0d773b5861791ba4328bce1d6b7007
                                                                                  • Opcode Fuzzy Hash: 5eb77c68aeb284640efe8db6decb9df9f45602fa61969d6ccdef9081f9bd5a7e
                                                                                  • Instruction Fuzzy Hash: 88110C3B200701AFDB189F39D8919BAB791FF84759B19442DE94687B40D7717943CB60
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 00D457CC: GetLastError.KERNEL32(?,00000008,00D4AD4C), ref: 00D457D0
                                                                                    • Part of subcall function 00D457CC: SetLastError.KERNEL32(00000000,00000000,00000004,000000FF), ref: 00D45872
                                                                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00D4E453,00000000,00000000,?), ref: 00D4E6E5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$InfoLocale
                                                                                  • String ID:
                                                                                  • API String ID: 3736152602-0
                                                                                  • Opcode ID: 6299d1907b94ac9dd20b8bf6c8f2dde0bc5d141d082a16c64e927164c5b62ae3
                                                                                  • Instruction ID: c8570a09e1a0b03b7c48818d923afb051771deace5056b99f4609f9eb4d0e5b9
                                                                                  • Opcode Fuzzy Hash: 6299d1907b94ac9dd20b8bf6c8f2dde0bc5d141d082a16c64e927164c5b62ae3
                                                                                  • Instruction Fuzzy Hash: B5F0F236600312BBDB285764CC45BBA7B58FB407B4F190464ED15E3180EA74FD41C6F0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 00D457CC: GetLastError.KERNEL32(?,00000008,00D4AD4C), ref: 00D457D0
                                                                                    • Part of subcall function 00D457CC: SetLastError.KERNEL32(00000000,00000000,00000004,000000FF), ref: 00D45872
                                                                                  • EnumSystemLocalesW.KERNEL32(00D4E48A,00000001,?,?,-00000050,?,00D4E82C,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 00D4E1F6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                                  • String ID:
                                                                                  • API String ID: 2417226690-0
                                                                                  • Opcode ID: d1bd7164c07cf01f85b843df3beed7788f3ef31b9bb755454484ca718a17d848
                                                                                  • Instruction ID: 3c7c12399ffd37f124a402d5cd7b86fabedadd7217864e3a969854fbb78d8766
                                                                                  • Opcode Fuzzy Hash: d1bd7164c07cf01f85b843df3beed7788f3ef31b9bb755454484ca718a17d848
                                                                                  • Instruction Fuzzy Hash: 8EF0F6362007047FDB245F399C85A7A7B95FF80768F19442CFA458B680D6B19C42DA74
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 00D41C9A: EnterCriticalSection.KERNEL32(-00D6DE50,?,00D43576,?,00D6A078,0000000C,00D43841,?), ref: 00D41CA9
                                                                                  • EnumSystemLocalesW.KERNEL32(00D47125,00000001,00D6A1D8,0000000C,00D47554,00000000), ref: 00D4716A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                  • String ID:
                                                                                  • API String ID: 1272433827-0
                                                                                  • Opcode ID: 1c11ab9ade6b843586766087ab04ca50b6e95f2dfbfb36999b7094b594aec546
                                                                                  • Instruction ID: 0ba2734259a004d60bc3b5b63093ad2f17da4989b6fa6dee0c90e8d410eed93c
                                                                                  • Opcode Fuzzy Hash: 1c11ab9ade6b843586766087ab04ca50b6e95f2dfbfb36999b7094b594aec546
                                                                                  • Instruction Fuzzy Hash: 95F03776A54300EFD700EF98E946B9877E0FB48722F10455AF415EB3A0EBB949048F70
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 00D457CC: GetLastError.KERNEL32(?,00000008,00D4AD4C), ref: 00D457D0
                                                                                    • Part of subcall function 00D457CC: SetLastError.KERNEL32(00000000,00000000,00000004,000000FF), ref: 00D45872
                                                                                  • EnumSystemLocalesW.KERNEL32(00D4E01F,00000001,?,?,?,00D4E88A,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00D4E0FD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                                  • String ID:
                                                                                  • API String ID: 2417226690-0
                                                                                  • Opcode ID: 36e47730b56429a359037d3002e8ff344343b50b9d22fb33c396a1bdae9bf4b4
                                                                                  • Instruction ID: 42e7406e5b0056bfd7dc9f6f70f685364acf03666e84a4c2c785e4d9fffd2234
                                                                                  • Opcode Fuzzy Hash: 36e47730b56429a359037d3002e8ff344343b50b9d22fb33c396a1bdae9bf4b4
                                                                                  • Instruction Fuzzy Hash: 57F02B3A300305ABCB04AF35DC45A6ABF95FFC1760F0A4068FE15CB651C6729882CBB0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • GetLocaleInfoEx.KERNEL32(?,00000022,00000000,00000002,?,?,00D300E2,00000000,00000000,00000004,00D2ED14,00000000,00000004,00D2F127,00000000,00000000), ref: 00D32410
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID:
                                                                                  • API String ID: 2299586839-0
                                                                                  • Opcode ID: f285ce673b17a6082e2d3f981b42fd26b5aaf41ccf64ad12aa7fa751a0274a86
                                                                                  • Instruction ID: b3bd104e9dad6def0d75add31f1e17a0ed6272749aecf1d5691eaecce0b80421
                                                                                  • Opcode Fuzzy Hash: f285ce673b17a6082e2d3f981b42fd26b5aaf41ccf64ad12aa7fa751a0274a86
                                                                                  • Instruction Fuzzy Hash: 9EE0D832A54208B6D7154BB8AE0FFBA76A8D71070AF544151EA02D40D1DAA1CB10A171
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00D44E3F,?,20001004,00000000,00000002,?,?,00D44441), ref: 00D476E3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID:
                                                                                  • API String ID: 2299586839-0
                                                                                  • Opcode ID: 932fbf8eceeefd23f03d0d92c1fd6a55ea4dd102b0ed1a08fa20224786122a00
                                                                                  • Instruction ID: 1cb8f10a916ec615bcd3805b3a1f92741003a784484780904cd21be95f5d2f58
                                                                                  • Opcode Fuzzy Hash: 932fbf8eceeefd23f03d0d92c1fd6a55ea4dd102b0ed1a08fa20224786122a00
                                                                                  • Instruction Fuzzy Hash: FCE04F3250871DBBCF122F61EC08EAE3E26EF44751F154010FC4565220CB718920AAF9
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 00D32C98: EnterCriticalSection.KERNEL32(hG,?,?,?,00D123B6,00D6E638,F83EBEA6,?,?,00D53D6D,000000FF), ref: 00D32CA3
                                                                                    • Part of subcall function 00D32C98: LeaveCriticalSection.KERNEL32(hG,?,?,?,00D123B6,00D6E638,F83EBEA6,?,?,00D53D6D,000000FF), ref: 00D32CE0
                                                                                  • GetProcessHeap.KERNEL32 ref: 00D12365
                                                                                    • Part of subcall function 00D32C4E: EnterCriticalSection.KERNEL32(hG,?,?,00D12427,00D6E638,00D56B40), ref: 00D32C58
                                                                                    • Part of subcall function 00D32C4E: LeaveCriticalSection.KERNEL32(hG,?,?,00D12427,00D6E638,00D56B40), ref: 00D32C8B
                                                                                    • Part of subcall function 00D32C4E: RtlWakeAllConditionVariable.NTDLL ref: 00D32D02
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$EnterLeave$ConditionHeapProcessVariableWake
                                                                                  • String ID:
                                                                                  • API String ID: 325507722-0
                                                                                  • Opcode ID: 99660c9e871e225f8ca156c31bd45bfa815ace2d4616f9fb0475f7fdb980d4a9
                                                                                  • Instruction ID: f7fffd8e9aed0d1ddfcf9cf67cd1525fac39712e0b7d6f1bbf68d371063406e3
                                                                                  • Opcode Fuzzy Hash: 99660c9e871e225f8ca156c31bd45bfa815ace2d4616f9fb0475f7fdb980d4a9
                                                                                  • Instruction Fuzzy Hash: A72157B8901340DFD710DF98ED4679977B0E725720F105B29E825DB3E1D7B659088BB2
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1279760036-0
                                                                                  • Opcode ID: 19985175945e013be11795148f7f951fa2f51accbe04c3ced831b3b586493099
                                                                                  • Instruction ID: f1985afa78fe488a986b088f53e2f5bd7076788865cc1b4fabd2d70994b4c1b6
                                                                                  • Opcode Fuzzy Hash: 19985175945e013be11795148f7f951fa2f51accbe04c3ced831b3b586493099
                                                                                  • Instruction Fuzzy Hash: 04328D74E0061ADFCF28CF98C991ABEBBB5EF44304F184169D945A7315D732AE46CBA0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d0d516049d5b9ac03af6c7016f6eb103bce98819b3104bf01d3fbf4f6fafc86a
                                                                                  • Instruction ID: a427b4fea17256f87be65ff5a30d9ab20442a257aa3e1b92ff5e07cf1b34bb8a
                                                                                  • Opcode Fuzzy Hash: d0d516049d5b9ac03af6c7016f6eb103bce98819b3104bf01d3fbf4f6fafc86a
                                                                                  • Instruction Fuzzy Hash: 27323721D28F414ED7235639DC7233AA288AFB73D5F15D727FC1AB5AA9EB29C4834110
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8a0b8f300b4750f939fb895fc3e71f6ba08ad7c38262be2b58e5f23929268bca
                                                                                  • Instruction ID: 9f223c4285ce8b583c31ab88c0cdbeb565ee15d90f035bb3c6b5c881011a60c2
                                                                                  • Opcode Fuzzy Hash: 8a0b8f300b4750f939fb895fc3e71f6ba08ad7c38262be2b58e5f23929268bca
                                                                                  • Instruction Fuzzy Hash: A0E179747006058FCB28CF6CC580AAAB7B1FF49310F69865AD5D6AB291D731ED42CB72
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastProcess$CurrentFeatureInfoLocalePresentProcessorTerminate
                                                                                  • String ID:
                                                                                  • API String ID: 3471368781-0
                                                                                  • Opcode ID: 2488e6b7928953762777d45b6c230696ae8edd920eb5caf5069f0e4883c7d2b4
                                                                                  • Instruction ID: 7f5acaa878eeb4c26ea90e62e221796c0112af76facba432ae5648168c89d987
                                                                                  • Opcode Fuzzy Hash: 2488e6b7928953762777d45b6c230696ae8edd920eb5caf5069f0e4883c7d2b4
                                                                                  • Instruction Fuzzy Hash: 0AB1D4755007419BDB38DF24CC92BB7B3BAEF54308F18456DE986C6680EA75E985CB30
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d45df35f10881d6221681adf7eefdf880ea19ec113d03b89221ba79bb02f15a8
                                                                                  • Instruction ID: cdc3065efea9e83f156ea069740ca5d480412e0cf2f167f1126fe14edea96168
                                                                                  • Opcode Fuzzy Hash: d45df35f10881d6221681adf7eefdf880ea19ec113d03b89221ba79bb02f15a8
                                                                                  • Instruction Fuzzy Hash: 96516472E00219EFDF14CF99C951AEEBBB1EF88350F598059E915BB241C734AE50CB61
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                  • Instruction ID: 8e43556b91eabd0625a4277d729cfb0ba59d09e2c53474a62f47d69d9adde3b4
                                                                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                  • Instruction Fuzzy Hash: 0511087720114243D604C62EC9B47B7E795EBC6335F2D836ED0918B758D62AF9459E30
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 2864318f6dce3f34aa64f3b9f5968b0c36cd4cfae0ffe164939727a64b01d4d1
                                                                                  • Instruction ID: 38e2ec799675e6d67270ba3eb0195ade0fcf41786bc7c99b04216bed6ac1bf44
                                                                                  • Opcode Fuzzy Hash: 2864318f6dce3f34aa64f3b9f5968b0c36cd4cfae0ffe164939727a64b01d4d1
                                                                                  • Instruction Fuzzy Hash: B1E08C72A11238EBCB14DBDCC90498AF3ECEB88B01B15049AF501E3500D370DE00D7E1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b3db29eff45ca403c5659c65b9b04778331e453842759ddf3eba89ef405327b8
                                                                                  • Instruction ID: 23f19a9985905387ab5895242a94ba2140173441612e0c74e124536a06103363
                                                                                  • Opcode Fuzzy Hash: b3db29eff45ca403c5659c65b9b04778331e453842759ddf3eba89ef405327b8
                                                                                  • Instruction Fuzzy Hash: 69C08C38840E0047CE2989148AB13B83354FB91792FC8058CD4030BA46C71EAC83D671
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D3011D
                                                                                  • collate.LIBCPMT ref: 00D30126
                                                                                    • Part of subcall function 00D2EDF2: __EH_prolog3_GS.LIBCMT ref: 00D2EDF9
                                                                                    • Part of subcall function 00D2EDF2: __Getcoll.LIBCPMT ref: 00D2EE5D
                                                                                  • __Getcoll.LIBCPMT ref: 00D3016C
                                                                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00D30180
                                                                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00D30195
                                                                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00D301D3
                                                                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00D301E6
                                                                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00D3022C
                                                                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00D30260
                                                                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00D3031B
                                                                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00D3032E
                                                                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00D3034B
                                                                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00D30368
                                                                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00D30385
                                                                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00D302BD
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • numpunct.LIBCPMT ref: 00D303C4
                                                                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00D303D4
                                                                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00D30418
                                                                                    • Part of subcall function 00D16330: LocalAlloc.KERNEL32(00000040,?,00D20E04,00000020,?,?,00D19942,00000000,F83EBEA6,?,?,?,?,00D550DD,000000FF), ref: 00D16336
                                                                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00D3042B
                                                                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 00D30448
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddfacLocimp::_Locimp_std::locale::_$GetcollLockitstd::_$AllocH_prolog3H_prolog3_LocalLockit::_Lockit::~_collatenumpunct
                                                                                  • String ID:
                                                                                  • API String ID: 3717464618-0
                                                                                  • Opcode ID: 2f95ac132c653f1ff3770ace050b953f4c8fde8f73359392f28b3f6d52b582f2
                                                                                  • Instruction ID: 21a4679a2d1bc72e5ec76e6230a590c2c922bafef62348962270dba621c9f945
                                                                                  • Opcode Fuzzy Hash: 2f95ac132c653f1ff3770ace050b953f4c8fde8f73359392f28b3f6d52b582f2
                                                                                  • Instruction Fuzzy Hash: 38910871D013117BE720BBB46C12BBFBEAADF51760F584429F85AA7281DE70894097F2
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00D1667E
                                                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 00D166D7
                                                                                  • LocalAlloc.KERNEL32(00000040,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 00D166E2
                                                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 00D166FE
                                                                                  • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00D167DB
                                                                                  • CloseHandle.KERNEL32(?), ref: 00D167E7
                                                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,?,?,?,?,?,?,?,?,?,00D549E5), ref: 00D1682F
                                                                                  • LocalAlloc.KERNEL32(00000040,00000000,?,?,?,?,?,?,?,?,?,00D549E5,000000FF), ref: 00D1684A
                                                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,?,?,?,?,?,?,?,?,?,00D549E5), ref: 00D16867
                                                                                  • LocalFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00D549E5,000000FF), ref: 00D16891
                                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000005), ref: 00D168D8
                                                                                  • ShellExecuteW.SHELL32(00000000,00000000,00000000,00000000,00000000,00000005), ref: 00D1692A
                                                                                  • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,00D549E5,000000FF), ref: 00D1695C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharLocalMultiWide$AllocExecuteFileFreeShell$CloseCreateHandleWrite
                                                                                  • String ID: -_.~!*'();:@&=+$,/?#[]$URL Shortcut content:$[InternetShortcut]URL=$open
                                                                                  • API String ID: 2199533872-3004881174
                                                                                  • Opcode ID: 498bf079c80ea376f254b90d103b26cd54904b42f97467ba7f0d3499c9bc0051
                                                                                  • Instruction ID: d4d56a86952fea39a82cf1cf95a7f12d51823c0c0da51b9c34f0f611e86e4001
                                                                                  • Opcode Fuzzy Hash: 498bf079c80ea376f254b90d103b26cd54904b42f97467ba7f0d3499c9bc0051
                                                                                  • Instruction Fuzzy Hash: 02B11471904249AFEB20CF68EC45BEFBBB5EF45700F144119E904AB2C1DB709A88CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • InitializeCriticalSectionAndSpinCount.KERNEL32(hG,00000FA0,?,?,00D32B6A), ref: 00D32B98
                                                                                  • GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,00D32B6A), ref: 00D32BA3
                                                                                  • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,00D32B6A), ref: 00D32BB4
                                                                                  • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS,?,?,00D32B6A), ref: 00D32BC6
                                                                                  • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable,?,?,00D32B6A), ref: 00D32BD4
                                                                                  • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,00D32B6A), ref: 00D32BF7
                                                                                  • DeleteCriticalSection.KERNEL32(hG,00000007,?,?,00D32B6A), ref: 00D32C13
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00D32C23
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                                                  • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$hG$kernel32.dll
                                                                                  • API String ID: 2565136772-2402821984
                                                                                  • Opcode ID: ad1d69512dcde28f61a708644596d719ef6ab4442fcb55466c43d4d4274095c6
                                                                                  • Instruction ID: c8ce277aba0e215d5681814a8504cbce011055a3301caf953774d7c8ec104a68
                                                                                  • Opcode Fuzzy Hash: ad1d69512dcde28f61a708644596d719ef6ab4442fcb55466c43d4d4274095c6
                                                                                  • Instruction Fuzzy Hash: CF017171F45711AFDA212F78BC09E6A7BB9DF55B53B290811FD04E23A4DEB4C8048A71
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • IsInExceptionSpec.LIBVCRUNTIME ref: 00D35DAC
                                                                                  • type_info::operator==.LIBVCRUNTIME ref: 00D35DCE
                                                                                  • ___TypeMatch.LIBVCRUNTIME ref: 00D35EDD
                                                                                  • IsInExceptionSpec.LIBVCRUNTIME ref: 00D35FAF
                                                                                  • _UnwindNestedFrames.LIBCMT ref: 00D36033
                                                                                  • CallUnexpected.LIBVCRUNTIME ref: 00D3604E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                                                  • String ID: csm$csm$csm
                                                                                  • API String ID: 2123188842-393685449
                                                                                  • Opcode ID: 59a267addb191385fce0af06aa896c85ceaa9cf4ded0208b34c3eee4196b04cc
                                                                                  • Instruction ID: 63f452cf2c868a58f54443964145ead3c147d9f17296cdf4110aca4936c33a55
                                                                                  • Opcode Fuzzy Hash: 59a267addb191385fce0af06aa896c85ceaa9cf4ded0208b34c3eee4196b04cc
                                                                                  • Instruction Fuzzy Hash: F5B17D71800609EFCF29DFA4E8819AEBBB5FF14310F18815AE8156B21AD771DA51CFB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • OpenProcess.KERNEL32(00000400,00000000,?,F83EBEA6,?,?,?), ref: 00D142D2
                                                                                  • OpenProcess.KERNEL32(00000400,00000000,?,?,F83EBEA6,?,?,?), ref: 00D142F3
                                                                                  • GetProcessTimes.KERNEL32(00000000,?,00000000,00000000,00000000,?,F83EBEA6,?,?,?), ref: 00D14326
                                                                                  • GetProcessTimes.KERNEL32(00000000,?,00000000,00000000,00000000,?,F83EBEA6,?,?,?), ref: 00D14337
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00D14355
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00D14371
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00D14399
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00D143B5
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00D143D3
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00D143EF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$Process$OpenTimes
                                                                                  • String ID:
                                                                                  • API String ID: 1711917922-0
                                                                                  • Opcode ID: 79ac19ffcc93c5ca323a1fee9469b796208b3c6a42bff631a3e40cb809e54dee
                                                                                  • Instruction ID: 8035115cc3af7b589236f11af6352345ea34118eabbed24640f70cd8757f27a4
                                                                                  • Opcode Fuzzy Hash: 79ac19ffcc93c5ca323a1fee9469b796208b3c6a42bff631a3e40cb809e54dee
                                                                                  • Instruction Fuzzy Hash: 19514870D41218AFDB10CF98E984BEEBBF4AF49714F294219E924B73C0CB7459458BB4
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D2BBC4
                                                                                    • Part of subcall function 00D2254E: __EH_prolog3.LIBCMT ref: 00D22555
                                                                                    • Part of subcall function 00D2254E: std::_Lockit::_Lockit.LIBCPMT ref: 00D2255F
                                                                                    • Part of subcall function 00D2254E: std::_Lockit::~_Lockit.LIBCPMT ref: 00D225D0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: H_prolog3Lockitstd::_$Lockit::_Lockit::~_
                                                                                  • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                                                                  • API String ID: 1538362411-2891247106
                                                                                  • Opcode ID: 0c1f886c73a1adda9d68b9b7dccb8503b140ceddbcd8f7b822c48b52bbbb3c77
                                                                                  • Instruction ID: 0024fa7fdf609c12ea6f998b2550f89a50ecdbfec348290eea60fc61a93e424a
                                                                                  • Opcode Fuzzy Hash: 0c1f886c73a1adda9d68b9b7dccb8503b140ceddbcd8f7b822c48b52bbbb3c77
                                                                                  • Instruction Fuzzy Hash: 4EB1BF7150011AAFCF19DF68ED55DFE3BA9EF24328F09411AFA46A2251D7B1CA10DB30
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D30CA4
                                                                                    • Part of subcall function 00D19270: std::_Lockit::_Lockit.LIBCPMT ref: 00D192A0
                                                                                    • Part of subcall function 00D19270: std::_Lockit::_Lockit.LIBCPMT ref: 00D192C2
                                                                                    • Part of subcall function 00D19270: std::_Lockit::~_Lockit.LIBCPMT ref: 00D192EA
                                                                                    • Part of subcall function 00D19270: std::_Lockit::~_Lockit.LIBCPMT ref: 00D19422
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                                                                  • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                                                                  • API String ID: 1383202999-2891247106
                                                                                  • Opcode ID: e7372e0d6df9a6b45d7bb537c0a7d0e08ede2922fd7149db2d471e0486b0c6f3
                                                                                  • Instruction ID: 047e4572b5f27ff3c7eb926419392bf84d0e6c5051bdc6df704451013b9f703d
                                                                                  • Opcode Fuzzy Hash: e7372e0d6df9a6b45d7bb537c0a7d0e08ede2922fd7149db2d471e0486b0c6f3
                                                                                  • Instruction Fuzzy Hash: 6AB19D7650020AAFCF29DFA8C969DFE3FB9EF18304F184519FA46A6251D631DA10DB70
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D2BF85
                                                                                    • Part of subcall function 00D18610: std::_Lockit::_Lockit.LIBCPMT ref: 00D18657
                                                                                    • Part of subcall function 00D18610: std::_Lockit::_Lockit.LIBCPMT ref: 00D18679
                                                                                    • Part of subcall function 00D18610: std::_Lockit::~_Lockit.LIBCPMT ref: 00D186A1
                                                                                    • Part of subcall function 00D18610: std::_Lockit::~_Lockit.LIBCPMT ref: 00D1880E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                                                                  • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                                                                  • API String ID: 1383202999-2891247106
                                                                                  • Opcode ID: 074c8c8fe29916bc5b642b3a3ac335a47847cea5ac6040afe3a31071e6ef074f
                                                                                  • Instruction ID: b58210b7ef8b14d421cf51db6e500ae9df3b0704cb98cfae83626e8c9a97e410
                                                                                  • Opcode Fuzzy Hash: 074c8c8fe29916bc5b642b3a3ac335a47847cea5ac6040afe3a31071e6ef074f
                                                                                  • Instruction Fuzzy Hash: 24B1CF7151021AEFCF19DFA4E956DBE3BB9EF29348F044109FA02A2252D631CE10DB70
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3_GS.LIBCMT ref: 00D2855C
                                                                                  • _Maklocstr.LIBCPMT ref: 00D285C5
                                                                                  • _Maklocstr.LIBCPMT ref: 00D285D7
                                                                                  • _Maklocchr.LIBCPMT ref: 00D285EF
                                                                                  • _Maklocchr.LIBCPMT ref: 00D285FF
                                                                                  • _Getvals.LIBCPMT ref: 00D28621
                                                                                    • Part of subcall function 00D21CD4: _Maklocchr.LIBCPMT ref: 00D21D03
                                                                                    • Part of subcall function 00D21CD4: _Maklocchr.LIBCPMT ref: 00D21D19
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Maklocchr$Maklocstr$GetvalsH_prolog3_
                                                                                  • String ID: false$true
                                                                                  • API String ID: 3549167292-2658103896
                                                                                  • Opcode ID: 9bfbaaa44439fcd23631241e63d7b7c323e081b4628b06d3a22fe97b154cc852
                                                                                  • Instruction ID: 7b87751d00270218ab006038c63553c9837cc3677244c1460228d5a580d10b29
                                                                                  • Opcode Fuzzy Hash: 9bfbaaa44439fcd23631241e63d7b7c323e081b4628b06d3a22fe97b154cc852
                                                                                  • Instruction Fuzzy Hash: 5B21A1B5D00324ABDF14EFA0E886ACF7B68EF14314F008156F9049F242DA70D944CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • LocalAlloc.KERNEL32(00000040,40000022,F83EBEA6,?,?,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00D14154
                                                                                  • LocalAlloc.KERNEL32(00000040,3FFFFFFF,F83EBEA6,?,?,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00D14177
                                                                                  • LocalFree.KERNEL32(?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00D14217
                                                                                  • OpenProcess.KERNEL32(00000400,00000000,?,F83EBEA6,?,?,?), ref: 00D142D2
                                                                                  • OpenProcess.KERNEL32(00000400,00000000,?,?,F83EBEA6,?,?,?), ref: 00D142F3
                                                                                  • GetProcessTimes.KERNEL32(00000000,?,00000000,00000000,00000000,?,F83EBEA6,?,?,?), ref: 00D14326
                                                                                  • GetProcessTimes.KERNEL32(00000000,?,00000000,00000000,00000000,?,F83EBEA6,?,?,?), ref: 00D14337
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00D14355
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00D14371
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$Local$AllocCloseHandleOpenTimes$Free
                                                                                  • String ID:
                                                                                  • API String ID: 1424318461-0
                                                                                  • Opcode ID: 6aec0fdc0ec0d75cea40d6602de39a2fa5eb93be69d22e3e973267d8610b2f4e
                                                                                  • Instruction ID: 0e0f28ac17fe076e973c369a3a2fe51689fd0d0651ec3003baf36ecfad8a5dc4
                                                                                  • Opcode Fuzzy Hash: 6aec0fdc0ec0d75cea40d6602de39a2fa5eb93be69d22e3e973267d8610b2f4e
                                                                                  • Instruction Fuzzy Hash: 97818771E00205AFDB14CF98D985BEDBBB5FB48710F244229E925E73D0DB70A9818BB4
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • GetCPInfo.KERNEL32(?,?,?,?,?), ref: 00D326F8
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00D32786
                                                                                  • __alloca_probe_16.LIBCMT ref: 00D327B0
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00D327F8
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00D32812
                                                                                  • __alloca_probe_16.LIBCMT ref: 00D32838
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00D32875
                                                                                  • CompareStringEx.KERNEL32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 00D32892
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$__alloca_probe_16$CompareInfoString
                                                                                  • String ID:
                                                                                  • API String ID: 3603178046-0
                                                                                  • Opcode ID: 94ffd8e88e75b3522b91e85b2f48f6e9184c84c33a4bda5e477fa311276e3661
                                                                                  • Instruction ID: 8f3f3b519783156eb35edf2246c5082d634cc9467d87f7da94c04f634d5f9bf5
                                                                                  • Opcode Fuzzy Hash: 94ffd8e88e75b3522b91e85b2f48f6e9184c84c33a4bda5e477fa311276e3661
                                                                                  • Instruction Fuzzy Hash: A3718176D0020AABDF219FA9DC45AFE7BB6FF45750F280059E944A7250DB75C900CBB0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 00D321A3
                                                                                  • __alloca_probe_16.LIBCMT ref: 00D321CF
                                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 00D3220E
                                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D3222B
                                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00D3226A
                                                                                  • __alloca_probe_16.LIBCMT ref: 00D32287
                                                                                  • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D322C9
                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00D322EC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                                                                  • String ID:
                                                                                  • API String ID: 2040435927-0
                                                                                  • Opcode ID: c549993042bc26eec041dc323d5f51044e0a24e340d0628919c9d0771ab31723
                                                                                  • Instruction ID: 229dc84e9a50f536480be789c2019a7e1439c104631f91903cb29df5089da433
                                                                                  • Opcode Fuzzy Hash: c549993042bc26eec041dc323d5f51044e0a24e340d0628919c9d0771ab31723
                                                                                  • Instruction Fuzzy Hash: 68519B7290030ABBDB208F64DC85FBB7BA9EF44B50F294028FA15E6190D774CD109B70
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D18657
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D18679
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D186A1
                                                                                  • LocalAlloc.KERNEL32(00000040,00000044,00000000,F83EBEA6,?,00000000), ref: 00D186F9
                                                                                  • __Getctype.LIBCPMT ref: 00D1877B
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D187E4
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D1880E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$AllocFacet_GetctypeLocalRegister
                                                                                  • String ID:
                                                                                  • API String ID: 2372200979-0
                                                                                  • Opcode ID: 9000578a4bc6f365de64188f2e820a901e8d71cc39fc94eecc6c8b84250063ac
                                                                                  • Instruction ID: eb99f22cadb72b8a655e417559e8b579ec30744caf3e6d2ff9499939739ccaab
                                                                                  • Opcode Fuzzy Hash: 9000578a4bc6f365de64188f2e820a901e8d71cc39fc94eecc6c8b84250063ac
                                                                                  • Instruction Fuzzy Hash: AC61C1B0D00754DFDB11CF68E940B9ABBF0EF14314F248159E845AB392EB70AA84DBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D192A0
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D192C2
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D192EA
                                                                                  • LocalAlloc.KERNEL32(00000040,00000018,00000000,F83EBEA6,?,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 00D19342
                                                                                  • __Getctype.LIBCPMT ref: 00D193BD
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D193F8
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D19422
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$AllocFacet_GetctypeLocalRegister
                                                                                  • String ID:
                                                                                  • API String ID: 2372200979-0
                                                                                  • Opcode ID: abe3ac0184d6bf574029eedd730842ebd7592091fcce3d5ddcbdbc6bbb5f8013
                                                                                  • Instruction ID: 28d3ba773af16f064307cd17a01a386def4a5013a8087d2c367b708ce4dabda1
                                                                                  • Opcode Fuzzy Hash: abe3ac0184d6bf574029eedd730842ebd7592091fcce3d5ddcbdbc6bbb5f8013
                                                                                  • Instruction Fuzzy Hash: 9551CDB0D04214EFDB11CF68E56079EBBF4EF14714F248159E855AB391DBB0AA84CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00D33F57
                                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00D33F5F
                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00D33FE8
                                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00D34013
                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00D34068
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                  • String ID: csm
                                                                                  • API String ID: 1170836740-1018135373
                                                                                  • Opcode ID: c00a3696d34793b8b3a31666c82b503eafc49aa84ca96610161d42a447e5ccef
                                                                                  • Instruction ID: 83bad509702c177447b75a891f6fcb59cf1cf5833ae27b1453e0ec41f911a54e
                                                                                  • Opcode Fuzzy Hash: c00a3696d34793b8b3a31666c82b503eafc49aa84ca96610161d42a447e5ccef
                                                                                  • Instruction Fuzzy Hash: 1A417D34E00209AFCF10DF68C981A9EBBB5EF44324F188156E915AB392D775EA05CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • EnterCriticalSection.KERNEL32(hG,?,?,00D12427,00D6E638,00D56B40), ref: 00D32C58
                                                                                  • LeaveCriticalSection.KERNEL32(hG,?,?,00D12427,00D6E638,00D56B40), ref: 00D32C8B
                                                                                  • RtlWakeAllConditionVariable.NTDLL ref: 00D32D02
                                                                                  • SetEvent.KERNEL32(?,00D12427,00D6E638,00D56B40), ref: 00D32D0C
                                                                                  • ResetEvent.KERNEL32(?,00D12427,00D6E638,00D56B40), ref: 00D32D18
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalEventSection$ConditionEnterLeaveResetVariableWake
                                                                                  • String ID: hG
                                                                                  • API String ID: 3916383385-2527930132
                                                                                  • Opcode ID: 3faa04cb824e6890971b82654db714c30bbba77a12305a9a9420ebe724f8486d
                                                                                  • Instruction ID: 2b72b166546762bffdb1be1d228324073bb6ca7f649926e35d47dc388c9b8a81
                                                                                  • Opcode Fuzzy Hash: 3faa04cb824e6890971b82654db714c30bbba77a12305a9a9420ebe724f8486d
                                                                                  • Instruction Fuzzy Hash: 24014231A08760DFCB11AF18FC08AA97BA6FB4A352B060469F802C3320CBB05801CFB0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D1B531
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D1B54F
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D1B577
                                                                                  • LocalAlloc.KERNEL32(00000040,0000000C,00000000,F83EBEA6,?,00000000,00000000), ref: 00D1B5CF
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D1B6B7
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D1B6E1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$AllocFacet_LocalRegister
                                                                                  • String ID:
                                                                                  • API String ID: 3931714976-0
                                                                                  • Opcode ID: 5d9b949cb0a596faa8a24739b8e30acbbe040ab796562224dad53cd3290a1d42
                                                                                  • Instruction ID: 5b2d493cc6b5867cd1819e57da580085a8e37ee597c4b69d492a092c6dd34758
                                                                                  • Opcode Fuzzy Hash: 5d9b949cb0a596faa8a24739b8e30acbbe040ab796562224dad53cd3290a1d42
                                                                                  • Instruction Fuzzy Hash: 5451A1B4900354EFDB11CF98E8807AEBBB4FF10324F24455AE855AB391DBB59A44CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D1B731
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D1B74F
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D1B777
                                                                                  • LocalAlloc.KERNEL32(00000040,00000008,00000000,F83EBEA6,?,00000000,00000000), ref: 00D1B7CF
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D1B863
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D1B88D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$AllocFacet_LocalRegister
                                                                                  • String ID:
                                                                                  • API String ID: 3931714976-0
                                                                                  • Opcode ID: 390b7c96f7dba029a1c0a743ebd073cd11c4835a1f9fc6c7be811d72ee90446e
                                                                                  • Instruction ID: e145f4ee51b6de01dcd776e702c91023dfa588f1a0e457992d6eee53674148b8
                                                                                  • Opcode Fuzzy Hash: 390b7c96f7dba029a1c0a743ebd073cd11c4835a1f9fc6c7be811d72ee90446e
                                                                                  • Instruction Fuzzy Hash: 8A51AEB4904314EFCB11CF98E58079EBBB4EB14724F24855EE851AB391DBB09E44CBB0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: __freea$__alloca_probe_16
                                                                                  • String ID: a/p$am/pm
                                                                                  • API String ID: 3509577899-3206640213
                                                                                  • Opcode ID: 984ef6541f0cad6fd8b5f3e9ace550dfb813a1520b71cd1587731cdb997fe683
                                                                                  • Instruction ID: 4f1a0ae81971ebb788fd07bb32ae1198b7db3e37ccb345a854065457de755bc8
                                                                                  • Opcode Fuzzy Hash: 984ef6541f0cad6fd8b5f3e9ace550dfb813a1520b71cd1587731cdb997fe683
                                                                                  • Instruction Fuzzy Hash: 9AC1CD35900216DBDB249F68C989ABABFB1FF45710F284049EB49AB650D335ED41CFB2
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(?,?,00D3596F,00D34900,00D3358F), ref: 00D35986
                                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00D35994
                                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00D359AD
                                                                                  • SetLastError.KERNEL32(00000000,00D3596F,00D34900,00D3358F), ref: 00D359FF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastValue___vcrt_
                                                                                  • String ID:
                                                                                  • API String ID: 3852720340-0
                                                                                  • Opcode ID: 12b74afd58dbe99649e6790aacf3d3b64c1087c0a7a04a79c09ef3d7a1a3d917
                                                                                  • Instruction ID: ff3f34d9b4bcde6f849e4da9c3a81cbc2822f8ba7ee2e7aa26b81508ae0ae0aa
                                                                                  • Opcode Fuzzy Hash: 12b74afd58dbe99649e6790aacf3d3b64c1087c0a7a04a79c09ef3d7a1a3d917
                                                                                  • Instruction Fuzzy Hash: E101D43721DB12EFA72426B4BD86B6A6B54DB0177AF240329F418C52E4EE918C0199B0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • GetTempFileNameW.KERNEL32(?,URL,00000000,?,F83EBEA6,?,00000004), ref: 00D13294
                                                                                  • MoveFileW.KERNEL32 ref: 00D1354A
                                                                                  • DeleteFileW.KERNEL32(?), ref: 00D13592
                                                                                    • Part of subcall function 00D11A70: LocalAlloc.KERNEL32(00000040,80000022), ref: 00D11AF7
                                                                                    • Part of subcall function 00D11A70: LocalFree.KERNEL32(7FFFFFFE), ref: 00D11B7D
                                                                                    • Part of subcall function 00D12E60: LocalFree.KERNEL32(?,F83EBEA6,?,?,00D53C40,000000FF,?,00D11242,F83EBEA6,?,?,00D53C75,000000FF), ref: 00D12EB1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileLocal$Free$AllocDeleteMoveNameTemp
                                                                                  • String ID: URL$url
                                                                                  • API String ID: 853893950-346267919
                                                                                  • Opcode ID: 0dfaae88180d9b709880954353dd3679e03e5c88ea723aac25d41afdf3804037
                                                                                  • Instruction ID: c4066eb92dc577edfbccdb0c8889bc5dfd88e3aa216df2361eddc6fbcf305315
                                                                                  • Opcode Fuzzy Hash: 0dfaae88180d9b709880954353dd3679e03e5c88ea723aac25d41afdf3804037
                                                                                  • Instruction Fuzzy Hash: A3C15870D14268AADB24DF28DC987DDBBB4BF14304F1442D9D409A7291EBB56BC8CFA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 00D11A20: LocalFree.KERNEL32(?), ref: 00D11A42
                                                                                    • Part of subcall function 00D33E5A: RaiseException.KERNEL32(E06D7363,00000001,00000003,00D11434,?,?,00D1D341,00D11434,00D68B5C,?,00D11434,?,00000000), ref: 00D33EBA
                                                                                  • GetCurrentProcess.KERNEL32(F83EBEA6,F83EBEA6,?,?,00000000,00D54981,000000FF), ref: 00D162EB
                                                                                    • Part of subcall function 00D32C98: EnterCriticalSection.KERNEL32(hG,?,?,?,00D123B6,00D6E638,F83EBEA6,?,?,00D53D6D,000000FF), ref: 00D32CA3
                                                                                    • Part of subcall function 00D32C98: LeaveCriticalSection.KERNEL32(hG,?,?,?,00D123B6,00D6E638,F83EBEA6,?,?,00D53D6D,000000FF), ref: 00D32CE0
                                                                                  • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process), ref: 00D162B0
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00D162B7
                                                                                    • Part of subcall function 00D32C4E: EnterCriticalSection.KERNEL32(hG,?,?,00D12427,00D6E638,00D56B40), ref: 00D32C58
                                                                                    • Part of subcall function 00D32C4E: LeaveCriticalSection.KERNEL32(hG,?,?,00D12427,00D6E638,00D56B40), ref: 00D32C8B
                                                                                    • Part of subcall function 00D32C4E: RtlWakeAllConditionVariable.NTDLL ref: 00D32D02
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$EnterLeave$AddressConditionCurrentExceptionFreeHandleLocalModuleProcProcessRaiseVariableWake
                                                                                  • String ID: IsWow64Process$kernel32
                                                                                  • API String ID: 1333104975-3789238822
                                                                                  • Opcode ID: 314cb12642a54923aad232cffe966daba0419da7ffe264b28a5a12ea6c042516
                                                                                  • Instruction ID: 96ae6e0d90ab3ced7b47b319a45bd3e670d8542c3f6f6de93f2b3bdac9215d2e
                                                                                  • Opcode Fuzzy Hash: 314cb12642a54923aad232cffe966daba0419da7ffe264b28a5a12ea6c042516
                                                                                  • Instruction Fuzzy Hash: EA21DE75944705EFCB10DFA4ED06B9DB7B8EB18B11F100629F911E33D0DBB4A9448A71
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Mpunct$GetvalsH_prolog3
                                                                                  • String ID: $+xv
                                                                                  • API String ID: 2204710431-1686923651
                                                                                  • Opcode ID: be13076b66305cd707f876776a9a040cd2617c840116fce456e1ad3cc21adfa2
                                                                                  • Instruction ID: 52cfc0ce46eb5a205a0ec7f1584641ca96842291fe89ccf83fe35e7b32e1f460
                                                                                  • Opcode Fuzzy Hash: be13076b66305cd707f876776a9a040cd2617c840116fce456e1ad3cc21adfa2
                                                                                  • Instruction Fuzzy Hash: 862192B1904BA2AFDB25EF74D49077BBEE8EB18305F04455AE459C7A42D734E602CBB0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(F83EBEA6,F83EBEA6,?,?,00000000,00D54981,000000FF), ref: 00D162EB
                                                                                    • Part of subcall function 00D32C98: EnterCriticalSection.KERNEL32(hG,?,?,?,00D123B6,00D6E638,F83EBEA6,?,?,00D53D6D,000000FF), ref: 00D32CA3
                                                                                    • Part of subcall function 00D32C98: LeaveCriticalSection.KERNEL32(hG,?,?,?,00D123B6,00D6E638,F83EBEA6,?,?,00D53D6D,000000FF), ref: 00D32CE0
                                                                                  • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process), ref: 00D162B0
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00D162B7
                                                                                    • Part of subcall function 00D32C4E: EnterCriticalSection.KERNEL32(hG,?,?,00D12427,00D6E638,00D56B40), ref: 00D32C58
                                                                                    • Part of subcall function 00D32C4E: LeaveCriticalSection.KERNEL32(hG,?,?,00D12427,00D6E638,00D56B40), ref: 00D32C8B
                                                                                    • Part of subcall function 00D32C4E: RtlWakeAllConditionVariable.NTDLL ref: 00D32D02
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$EnterLeave$AddressConditionCurrentHandleModuleProcProcessVariableWake
                                                                                  • String ID: IsWow64Process$kernel32
                                                                                  • API String ID: 2056477612-3789238822
                                                                                  • Opcode ID: 6f03bd4daad9cc7ac7768ac23938a6a9297be66d03f0ee4e0283bb485626714e
                                                                                  • Instruction ID: e572f765f2deff8e829aaa9e51bf98e127105570869ed72fa593944aff619f86
                                                                                  • Opcode Fuzzy Hash: 6f03bd4daad9cc7ac7768ac23938a6a9297be66d03f0ee4e0283bb485626714e
                                                                                  • Instruction Fuzzy Hash: E8118E76D04715EFCB10CF98ED05B99B7A8E714B11F14066AE811D37D0EBB5A9048A71
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,F83EBEA6,?,?,00000000,00D56A6C,000000FF,?,00D42DC1,?,?,00D42D95,?), ref: 00D42E23
                                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,00000000,00D56A6C,000000FF,?,00D42DC1,?,?,00D42D95,?), ref: 00D42E35
                                                                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00D56A6C,000000FF,?,00D42DC1,?,?,00D42D95,?), ref: 00D42E57
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                  • API String ID: 4061214504-1276376045
                                                                                  • Opcode ID: e6c0fb7c2ade8362339411a57254d638378ceff4248fdf6c32e1897a91e75425
                                                                                  • Instruction ID: 23e2a4fad52d96905d70e2994303663c1de2ac1479a7416f1ad264e3eff49389
                                                                                  • Opcode Fuzzy Hash: e6c0fb7c2ade8362339411a57254d638378ceff4248fdf6c32e1897a91e75425
                                                                                  • Instruction Fuzzy Hash: D7016272918729AFDB128F54DC05FBEBBB8FB04B12F044625FC11E27A0DB749904CAA0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • SleepConditionVariableCS.KERNEL32(?,00D32CBD,00000064), ref: 00D32D43
                                                                                  • LeaveCriticalSection.KERNEL32(hG,?,?,00D32CBD,00000064,?,?,?,00D123B6,00D6E638,F83EBEA6,?,?,00D53D6D,000000FF), ref: 00D32D4D
                                                                                  • WaitForSingleObjectEx.KERNEL32(?,00000000), ref: 00D32D5E
                                                                                  • EnterCriticalSection.KERNEL32(hG,?,00D32CBD,00000064,?,?,?,00D123B6,00D6E638,F83EBEA6,?,?,00D53D6D,000000FF), ref: 00D32D65
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
                                                                                  • String ID: hG
                                                                                  • API String ID: 3269011525-2527930132
                                                                                  • Opcode ID: 0756e6048c0b9ccc453705607d70320881ae71c8386f734bbe4bda6ec607c4ff
                                                                                  • Instruction ID: 8fb46d4a1a4a4edce5385995f3bd9a7fb95077ff620f9eb86c4927e578383d06
                                                                                  • Opcode Fuzzy Hash: 0756e6048c0b9ccc453705607d70320881ae71c8386f734bbe4bda6ec607c4ff
                                                                                  • Instruction Fuzzy Hash: B0E0ED32E45724ABCA123B54FC08ADE3E2AAB09B52F150051F949A6271CAA159108FF5
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D1B8DD
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D1B900
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D1B928
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D1B98D
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D1B9B7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                                  • String ID:
                                                                                  • API String ID: 459529453-0
                                                                                  • Opcode ID: a124901a30eeeadbce2e512d695588b626fb05e991b7c4d9db28db6a9c852e7b
                                                                                  • Instruction ID: c744ca534041f6712f8dcd51a94b4dcd54c4fbe4cb9e6aff31fe5c31f8a0a1f6
                                                                                  • Opcode Fuzzy Hash: a124901a30eeeadbce2e512d695588b626fb05e991b7c4d9db28db6a9c852e7b
                                                                                  • Instruction Fuzzy Hash: E1315775900214EFCB11DF58E940BADBBB4EF24734F14419AE800A73A2DB70AE42CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(00000000,?,?,75D61E4D,00D15646,?,?,?,?,?), ref: 00D15898
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast
                                                                                  • String ID: Call to ShellExecuteEx() returned:$Last error=$false$true
                                                                                  • API String ID: 1452528299-1782174991
                                                                                  • Opcode ID: 6efb6a5da13112727db0e5aaa42a3998686d5f7371c74152d227b0a2e132fc34
                                                                                  • Instruction ID: babafd8484c1361f428dcd58fcf21c8b92e0c43790327b905b6cd003725eaa14
                                                                                  • Opcode Fuzzy Hash: 6efb6a5da13112727db0e5aaa42a3998686d5f7371c74152d227b0a2e132fc34
                                                                                  • Instruction Fuzzy Hash: 2F118255A10621D7CB301F6CB8103A6A2E4DF94764F69047FE889D7395EAA98CC183B5
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Maklocstr$Maklocchr
                                                                                  • String ID:
                                                                                  • API String ID: 2020259771-0
                                                                                  • Opcode ID: 03ab7def85c8cdd80758cf191135069fb5b511cbd7496d136c767e59c0a8e0fc
                                                                                  • Instruction ID: 4e63506ec14b02dd966128becf8b5212bc53cce391cc825d9a36a2b8ed09cbbf
                                                                                  • Opcode Fuzzy Hash: 03ab7def85c8cdd80758cf191135069fb5b511cbd7496d136c767e59c0a8e0fc
                                                                                  • Instruction Fuzzy Hash: F011BCF5940794BBE720DBA4AC81F12B7ACEF24318F088619FA458BA40C264FC4487B4
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D1D883
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D1D88D
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • numpunct.LIBCPMT ref: 00D1D8C7
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D1D8DE
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D1D8FE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registernumpunct
                                                                                  • String ID:
                                                                                  • API String ID: 743221004-0
                                                                                  • Opcode ID: b459dd1f9926d12816031f3ac0b685fdab5432bbac8313a2fafae74f3e560b4b
                                                                                  • Instruction ID: 0f51c90d1b0bcdd6fde93ed33b56944db203a0e14c41eaf6692f67cbfca5cfa3
                                                                                  • Opcode Fuzzy Hash: b459dd1f9926d12816031f3ac0b685fdab5432bbac8313a2fafae74f3e560b4b
                                                                                  • Instruction Fuzzy Hash: 7511CE75A00225ABCB04EB60B8116EEB762EF94315F280409F801AB391CF709E41CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D22301
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D2230B
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • codecvt.LIBCPMT ref: 00D22345
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D2235C
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D2237C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                                                                  • String ID:
                                                                                  • API String ID: 712880209-0
                                                                                  • Opcode ID: 9b9d3d5f5aced9831b7b07fa7d6d90cd7050920a1d7e9a32aa5dba82304c5007
                                                                                  • Instruction ID: e6a76003cab060406c0a729ec6355df4caba4ad0fc252793f05f66cbc3808b58
                                                                                  • Opcode Fuzzy Hash: 9b9d3d5f5aced9831b7b07fa7d6d90cd7050920a1d7e9a32aa5dba82304c5007
                                                                                  • Instruction Fuzzy Hash: 4E01D635900225EFCB15EB64F8016BEB762EF94714F240509F400AB391DF749E408BF1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D22396
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D223A0
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • codecvt.LIBCPMT ref: 00D223DA
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D223F1
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D22411
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                                                                  • String ID:
                                                                                  • API String ID: 712880209-0
                                                                                  • Opcode ID: ea2a603c51a00f4c5671de02af73912cc8d2588184d0aa333f78b9de162c1e75
                                                                                  • Instruction ID: a4e7f5050b75f37c7e129fcb3e4d7c51240c52231c5f4a1b87c615e304a62062
                                                                                  • Opcode Fuzzy Hash: ea2a603c51a00f4c5671de02af73912cc8d2588184d0aa333f78b9de162c1e75
                                                                                  • Instruction Fuzzy Hash: B801D635A00229AFCB05EB64F9416BE7762EFA4714F280409F411AB392DF74DE45CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D224C0
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D224CA
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • collate.LIBCPMT ref: 00D22504
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D2251B
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D2253B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercollate
                                                                                  • String ID:
                                                                                  • API String ID: 1007100420-0
                                                                                  • Opcode ID: 88f2e9f94ff5cff21aa063455268f3eb91d7ca234b15bd79870cc4b935df3da2
                                                                                  • Instruction ID: e362ffb994bd4d5b21dcb2b3d0cf4160ec45c5fa134d18b627fdc5523b592673
                                                                                  • Opcode Fuzzy Hash: 88f2e9f94ff5cff21aa063455268f3eb91d7ca234b15bd79870cc4b935df3da2
                                                                                  • Instruction Fuzzy Hash: 1301C435900225ABCB05EB64F8556BEB762EFA4724F254409F400AB392CF749E418BB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D2242B
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D22435
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • collate.LIBCPMT ref: 00D2246F
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D22486
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D224A6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercollate
                                                                                  • String ID:
                                                                                  • API String ID: 1007100420-0
                                                                                  • Opcode ID: f7a1a77fa8842e26cb04d373e83a4c134debf0433014d5096e473deea105766a
                                                                                  • Instruction ID: 18ca82221c958258dd053199ebaecdc3cf125d251425085ac3dddedf73bfe2b1
                                                                                  • Opcode Fuzzy Hash: f7a1a77fa8842e26cb04d373e83a4c134debf0433014d5096e473deea105766a
                                                                                  • Instruction Fuzzy Hash: D9018435900225AFCB05EB64F9516BE7B62EFA4728F280549F400AB392DF749E45CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D225EA
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D225F4
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • messages.LIBCPMT ref: 00D2262E
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D22645
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D22665
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermessages
                                                                                  • String ID:
                                                                                  • API String ID: 2750803064-0
                                                                                  • Opcode ID: 71864064cf3db49cf1c8973968a7eebae57f8866bf57b6a206140e496035549b
                                                                                  • Instruction ID: dc05c340ae168b00d4f491a6b9d5b9c4751c8a9146b45ee0dc7f4b39a830e33b
                                                                                  • Opcode Fuzzy Hash: 71864064cf3db49cf1c8973968a7eebae57f8866bf57b6a206140e496035549b
                                                                                  • Instruction Fuzzy Hash: AE019636900225ABCB05EB64F815ABEBB72FFA4715F244509F411AB392DF749E40CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D22555
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D2255F
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • ctype.LIBCPMT ref: 00D22599
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D225B0
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D225D0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registerctype
                                                                                  • String ID:
                                                                                  • API String ID: 83828444-0
                                                                                  • Opcode ID: 90b3e8e991acde85d4a85e99fbce809ffdcaf03c062af45ff26807012d15e143
                                                                                  • Instruction ID: 7472d68ab3251ebbd34546be3a90b7cad555f7731d4315f771df4da3c59c5873
                                                                                  • Opcode Fuzzy Hash: 90b3e8e991acde85d4a85e99fbce809ffdcaf03c062af45ff26807012d15e143
                                                                                  • Instruction Fuzzy Hash: A201C435900229ABCB05EB60F811ABE7762EF94314F244409F411AB392DF749E40CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D1D6C4
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D1D6CE
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • codecvt.LIBCPMT ref: 00D1D708
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D1D71F
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D1D73F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                                                                  • String ID:
                                                                                  • API String ID: 712880209-0
                                                                                  • Opcode ID: 2fd9b3669f9394952a796d78be80858d8eb01222de74c709362d26bb8951ae04
                                                                                  • Instruction ID: 99f4de0802da2c5ec81ccd2ae54a60acb82a8377e4cc90a9a877218181ba591e
                                                                                  • Opcode Fuzzy Hash: 2fd9b3669f9394952a796d78be80858d8eb01222de74c709362d26bb8951ae04
                                                                                  • Instruction Fuzzy Hash: A0018035900225ABCB15EB64B9516EEBBA2FF94710F290509F802AB3D2DF749E41C7B1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D2267F
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D22689
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • messages.LIBCPMT ref: 00D226C3
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D226DA
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D226FA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermessages
                                                                                  • String ID:
                                                                                  • API String ID: 2750803064-0
                                                                                  • Opcode ID: d8a00b82484e03f07bda2ca0409cd96dbc63931270af3dc9618a80db7701f873
                                                                                  • Instruction ID: a8fdc3e58420fd1306a2ba4b717ddcc17f0ae24876205830d2378cb3ad241ea7
                                                                                  • Opcode Fuzzy Hash: d8a00b82484e03f07bda2ca0409cd96dbc63931270af3dc9618a80db7701f873
                                                                                  • Instruction Fuzzy Hash: 8D01D635900225AFCB05EB64F8456BEB772EF94314F250409F411AB392CF749E01CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D2E8DF
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D2E8E9
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • messages.LIBCPMT ref: 00D2E923
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D2E93A
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D2E95A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermessages
                                                                                  • String ID:
                                                                                  • API String ID: 2750803064-0
                                                                                  • Opcode ID: 545489b2c375014b83b423efee879518e0bd792dbbd3115945274447deec775a
                                                                                  • Instruction ID: 8c0e659a6bb9045eb47fb4ab8f8911e8e5d68fc5a05035cc06bda917fac839b4
                                                                                  • Opcode Fuzzy Hash: 545489b2c375014b83b423efee879518e0bd792dbbd3115945274447deec775a
                                                                                  • Instruction Fuzzy Hash: A401D2359002259FCB15EB60F9016BEBBA2FFA4714F29050AF400AB392CF749E40CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D2E84A
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D2E854
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • collate.LIBCPMT ref: 00D2E88E
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D2E8A5
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D2E8C5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercollate
                                                                                  • String ID:
                                                                                  • API String ID: 1007100420-0
                                                                                  • Opcode ID: d121c00d43a59da05999ee389eb9e44d6dab783b41876a8cecf9b352f7f9f5f8
                                                                                  • Instruction ID: ec07af0092b24aea91c123a3995a912339c7f06493982c32bb57a404926c665c
                                                                                  • Opcode Fuzzy Hash: d121c00d43a59da05999ee389eb9e44d6dab783b41876a8cecf9b352f7f9f5f8
                                                                                  • Instruction Fuzzy Hash: A50188759002259FCB05EB64B8116AEB761EF94714F284505F405AB391DF749E409BB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D229FD
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D22A07
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • moneypunct.LIBCPMT ref: 00D22A41
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D22A58
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D22A78
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                                                  • String ID:
                                                                                  • API String ID: 419941038-0
                                                                                  • Opcode ID: de8f038decfa5f5308e46b9c2da89f557a4fa44e1abdb4fa8027e6179f0e6a57
                                                                                  • Instruction ID: 17a34534e6f178323768dbf7b9087738aa51466c8e12f9aa94d934a0fe894189
                                                                                  • Opcode Fuzzy Hash: de8f038decfa5f5308e46b9c2da89f557a4fa44e1abdb4fa8027e6179f0e6a57
                                                                                  • Instruction Fuzzy Hash: 3B01D675900225EFCB15EB64F8516BE7762EF94314F250509F800AB392DF749E41CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D22968
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D22972
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • moneypunct.LIBCPMT ref: 00D229AC
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D229C3
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D229E3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                                                  • String ID:
                                                                                  • API String ID: 419941038-0
                                                                                  • Opcode ID: 4dec6558cab8b89bf857a95f6454bb34a70421a8a5250fc5021dba17aa3b4805
                                                                                  • Instruction ID: c7816ddc0f53e14be3357adabad775429c9ca60712b287e1882b51276e3455f4
                                                                                  • Opcode Fuzzy Hash: 4dec6558cab8b89bf857a95f6454bb34a70421a8a5250fc5021dba17aa3b4805
                                                                                  • Instruction Fuzzy Hash: C6019675940225EFCB05EB64F8516BEB766EF94714F24050AF810AB392DF749E408FB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D2EA9E
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D2EAA8
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • moneypunct.LIBCPMT ref: 00D2EAE2
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D2EAF9
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D2EB19
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                                                  • String ID:
                                                                                  • API String ID: 419941038-0
                                                                                  • Opcode ID: 5f08fcb2de39ffe983538256cab2f481470930dbb13273c2fab3444ab08e42da
                                                                                  • Instruction ID: 1c24dee352a8b8a8bdc8b6596f3343c11fe4e9c0565bca86f13d33777e426d86
                                                                                  • Opcode Fuzzy Hash: 5f08fcb2de39ffe983538256cab2f481470930dbb13273c2fab3444ab08e42da
                                                                                  • Instruction Fuzzy Hash: 0F01C075E002299BCB15EB60F9116AEB762FFA4324F280509F401AB396DF709E008BB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D22A92
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D22A9C
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • moneypunct.LIBCPMT ref: 00D22AD6
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D22AED
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D22B0D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                                                  • String ID:
                                                                                  • API String ID: 419941038-0
                                                                                  • Opcode ID: b454924250fe8079abd048216cfff4560d521ec868b9cd3ac42b00ea8235e4b5
                                                                                  • Instruction ID: 3da51d932bf78e754489d6caecf0cefbe5b22f3a8656e8acf319d2525fddb89a
                                                                                  • Opcode Fuzzy Hash: b454924250fe8079abd048216cfff4560d521ec868b9cd3ac42b00ea8235e4b5
                                                                                  • Instruction Fuzzy Hash: F801C435900225AFCB15EB64B8116BEB762EFA4324F290509F800AB392CF749E04CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D22B27
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D22B31
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • moneypunct.LIBCPMT ref: 00D22B6B
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D22B82
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D22BA2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                                                  • String ID:
                                                                                  • API String ID: 419941038-0
                                                                                  • Opcode ID: c48a10275bb336f318e424071ca38de8b5a7ca001f138ff9a69a5fa3f78cc046
                                                                                  • Instruction ID: 0b00441c53c8a616c3a4f62e16977605ef3d2e2753f1114e8a189cdd6af55427
                                                                                  • Opcode Fuzzy Hash: c48a10275bb336f318e424071ca38de8b5a7ca001f138ff9a69a5fa3f78cc046
                                                                                  • Instruction Fuzzy Hash: 2701C035A00325EBCB15EB64F8456BEBB72EF94724F280409F400AB396DF749E408BB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D2EB33
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D2EB3D
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • moneypunct.LIBCPMT ref: 00D2EB77
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D2EB8E
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D2EBAE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                                                  • String ID:
                                                                                  • API String ID: 419941038-0
                                                                                  • Opcode ID: 593b2c664b89e4beba75e38cdde0666e6b29b55c0b97350f72d7352d33ec351e
                                                                                  • Instruction ID: 6fa2d52e6c1c4538fc5b1cf53e495d3c08a2d71f5313d4c3e0b132008c7b50b8
                                                                                  • Opcode Fuzzy Hash: 593b2c664b89e4beba75e38cdde0666e6b29b55c0b97350f72d7352d33ec351e
                                                                                  • Instruction Fuzzy Hash: 2101C435900225DFCB05EB60F8516AEB762EF94714F290449F811AB392CF709E008BB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D22D7B
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D22D85
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • numpunct.LIBCPMT ref: 00D22DBF
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D22DD6
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D22DF6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registernumpunct
                                                                                  • String ID:
                                                                                  • API String ID: 743221004-0
                                                                                  • Opcode ID: f4e13632235c4efc48c2591650779d512402c82cd81bb1d8cd3d2dd12f8a2cc1
                                                                                  • Instruction ID: 8bc381f7b28dd2a51b7357ba48029b0b117f527acfeda4618bef5b1f4b8a045d
                                                                                  • Opcode Fuzzy Hash: f4e13632235c4efc48c2591650779d512402c82cd81bb1d8cd3d2dd12f8a2cc1
                                                                                  • Instruction Fuzzy Hash: 4A01D635900225AFCB05EB60F9516BEB762FF94314F290409F410AB392DF749E419BF1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • LocalAlloc.KERNEL32(00000040,00000018,F83EBEA6,?,00000000), ref: 00D1BBA3
                                                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00D1BD7F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocConcurrency::cancel_current_taskLocal
                                                                                  • String ID: false$true
                                                                                  • API String ID: 3924972193-2658103896
                                                                                  • Opcode ID: 6a5a49a4b63627bbe879c8553c2cc2744caef44c6dfee0d94504f83315c119b7
                                                                                  • Instruction ID: e44c5ee0de4f5e2655a724f5fb7a4231dba8d04a89c6fe9468acee4ce0f0b5da
                                                                                  • Opcode Fuzzy Hash: 6a5a49a4b63627bbe879c8553c2cc2744caef44c6dfee0d94504f83315c119b7
                                                                                  • Instruction Fuzzy Hash: 4F61A4B1D00748EFDB10CFA4D941BDEB7B4FF14304F14425AE855AB281EB75AA84CBA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3_GS.LIBCMT ref: 00D2D3D2
                                                                                    • Part of subcall function 00D2254E: __EH_prolog3.LIBCMT ref: 00D22555
                                                                                    • Part of subcall function 00D2254E: std::_Lockit::_Lockit.LIBCPMT ref: 00D2255F
                                                                                    • Part of subcall function 00D2254E: std::_Lockit::~_Lockit.LIBCPMT ref: 00D225D0
                                                                                  • _Find_elem.LIBCPMT ref: 00D2D46E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Lockitstd::_$Find_elemH_prolog3H_prolog3_Lockit::_Lockit::~_
                                                                                  • String ID: %.0Lf$0123456789-
                                                                                  • API String ID: 2544715827-3094241602
                                                                                  • Opcode ID: 7bfc5f229ba0c628adc2ef9d517d72dab1a7541ba27365cce78b00861ffdc359
                                                                                  • Instruction ID: 7106d4ce0e13d81530adaecc4da0ee7eec5ddc9e0c8c7403ed8efdee13e6b14b
                                                                                  • Opcode Fuzzy Hash: 7bfc5f229ba0c628adc2ef9d517d72dab1a7541ba27365cce78b00861ffdc359
                                                                                  • Instruction Fuzzy Hash: 4F415131900228DFCF15EFA8E8809DDBBB5FF24318F500159E901AB255DB30EA56CBB5
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3_GS.LIBCMT ref: 00D2D676
                                                                                    • Part of subcall function 00D18610: std::_Lockit::_Lockit.LIBCPMT ref: 00D18657
                                                                                    • Part of subcall function 00D18610: std::_Lockit::_Lockit.LIBCPMT ref: 00D18679
                                                                                    • Part of subcall function 00D18610: std::_Lockit::~_Lockit.LIBCPMT ref: 00D186A1
                                                                                    • Part of subcall function 00D18610: std::_Lockit::~_Lockit.LIBCPMT ref: 00D1880E
                                                                                  • _Find_elem.LIBCPMT ref: 00D2D712
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$Find_elemH_prolog3_
                                                                                  • String ID: 0123456789-$0123456789-
                                                                                  • API String ID: 3042121994-2494171821
                                                                                  • Opcode ID: 3ededb3af1a747bcb629c3aaa1126a357d6dd49c2a41ca77cc2305373843598e
                                                                                  • Instruction ID: 57bda3cd64eda5f1cb6450a2f5a3164dfa8b7aedf00a4307da9850bd071e818f
                                                                                  • Opcode Fuzzy Hash: 3ededb3af1a747bcb629c3aaa1126a357d6dd49c2a41ca77cc2305373843598e
                                                                                  • Instruction Fuzzy Hash: A841AF31900228DFCF01DFA8E880ADEBBB6FF18314F100059E911AB255DB30DA56CBB5
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3_GS.LIBCMT ref: 00D31761
                                                                                    • Part of subcall function 00D19270: std::_Lockit::_Lockit.LIBCPMT ref: 00D192A0
                                                                                    • Part of subcall function 00D19270: std::_Lockit::_Lockit.LIBCPMT ref: 00D192C2
                                                                                    • Part of subcall function 00D19270: std::_Lockit::~_Lockit.LIBCPMT ref: 00D192EA
                                                                                    • Part of subcall function 00D19270: std::_Lockit::~_Lockit.LIBCPMT ref: 00D19422
                                                                                  • _Find_elem.LIBCPMT ref: 00D317FB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$Find_elemH_prolog3_
                                                                                  • String ID: 0123456789-$0123456789-
                                                                                  • API String ID: 3042121994-2494171821
                                                                                  • Opcode ID: 08347e746da1da060c49ca38596fe702082e4acc17dba0b8270452b334fd2952
                                                                                  • Instruction ID: 9e5f065f632cf94f3dc98cc0570af1d5d8e241dd7f25586ab49712b7abd5219d
                                                                                  • Opcode Fuzzy Hash: 08347e746da1da060c49ca38596fe702082e4acc17dba0b8270452b334fd2952
                                                                                  • Instruction Fuzzy Hash: DB415975900209EFCF05DFA8E891AEEBBB5FF04314F14005AF811AB252DB359A56CBB5
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D2838D
                                                                                    • Part of subcall function 00D21C42: _Maklocstr.LIBCPMT ref: 00D21C62
                                                                                    • Part of subcall function 00D21C42: _Maklocstr.LIBCPMT ref: 00D21C7F
                                                                                    • Part of subcall function 00D21C42: _Maklocstr.LIBCPMT ref: 00D21C9C
                                                                                    • Part of subcall function 00D21C42: _Maklocchr.LIBCPMT ref: 00D21CAE
                                                                                    • Part of subcall function 00D21C42: _Maklocchr.LIBCPMT ref: 00D21CC1
                                                                                  • _Mpunct.LIBCPMT ref: 00D2841A
                                                                                  • _Mpunct.LIBCPMT ref: 00D28434
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Maklocstr$MaklocchrMpunct$H_prolog3
                                                                                  • String ID: $+xv
                                                                                  • API String ID: 2939335142-1686923651
                                                                                  • Opcode ID: 37707c79b6fd53ff3ea93d2d69208bc54830aaecc12a3847bca1381f355f316a
                                                                                  • Instruction ID: 6dd9f6505ced3a5eaf9aa5861d3636b95c45b9682ffde7f45f36ead8d6680450
                                                                                  • Opcode Fuzzy Hash: 37707c79b6fd53ff3ea93d2d69208bc54830aaecc12a3847bca1381f355f316a
                                                                                  • Instruction Fuzzy Hash: CD2192B1904BA26FD725EF75D49077BBEE8EB18305F04455AE499C7A42D730E602CBB0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Mpunct$H_prolog3
                                                                                  • String ID: $+xv
                                                                                  • API String ID: 4281374311-1686923651
                                                                                  • Opcode ID: 01ae3770d015ac26a1ec14b9645939277e77eb1aeccec3d118e7624686e07077
                                                                                  • Instruction ID: bd141b11c39ab82cf9e7ba03c998d06c3b9cc49bfdac891546e40c206e25e60e
                                                                                  • Opcode Fuzzy Hash: 01ae3770d015ac26a1ec14b9645939277e77eb1aeccec3d118e7624686e07077
                                                                                  • Instruction Fuzzy Hash: 752190B1904B926EDB25DF74849077BBEF8EB08301F044A1AE499C7A42D734E601CBB0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • LocalAlloc.KERNEL32(00000040,?,?,?,?,?,00D11434,?,00000000), ref: 00D12569
                                                                                  • LocalAlloc.KERNEL32(00000040,?,?,?,?,?,00D11434,?,00000000), ref: 00D12589
                                                                                  • LocalFree.KERNEL32(?,00D11434,?,00000000), ref: 00D125DF
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00D12633
                                                                                  • LocalFree.KERNEL32(?,F83EBEA6,?,00000000,00D53C40,000000FF,00000008,?,?,?,?,00D11434), ref: 00D12647
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Local$AllocFree$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1291444452-0
                                                                                  • Opcode ID: 7a25c8d8c4417dbb30be33dbf9cd6a2ead241211f6ac8d9e0a58bd0dd43ba50e
                                                                                  • Instruction ID: 822ddc144614b3bbea59a06589ab95487fb63dbbfaac46db3bf5f8b0ab456d61
                                                                                  • Opcode Fuzzy Hash: 7a25c8d8c4417dbb30be33dbf9cd6a2ead241211f6ac8d9e0a58bd0dd43ba50e
                                                                                  • Instruction Fuzzy Hash: 22412A32600311ABD7149F28F8D4AFAB7E9EB45361F240629F866C76D0EF32D8948770
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • GetConsoleOutputCP.KERNEL32 ref: 00D51DFE
                                                                                    • Part of subcall function 00D4A9BB: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00D46F5E,?,00000000,-00000008), ref: 00D4AA67
                                                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00D52059
                                                                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00D520A1
                                                                                  • GetLastError.KERNEL32 ref: 00D52144
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                  • String ID:
                                                                                  • API String ID: 2112829910-0
                                                                                  • Opcode ID: 80dc0d162f3501b93a341a6ed027a0da9579876e12c015a23dfa6a5a7e7c27d0
                                                                                  • Instruction ID: 882e896e20833464a8acb7025a6fd479362069f5ed3e56304d241e01d72d0229
                                                                                  • Opcode Fuzzy Hash: 80dc0d162f3501b93a341a6ed027a0da9579876e12c015a23dfa6a5a7e7c27d0
                                                                                  • Instruction Fuzzy Hash: 03D157B5D002589FCF15CFA8D880AAEBBB5FF09311F28452AED55EB351D730A949CB60
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: _strcspn$H_prolog3_ctype
                                                                                  • String ID:
                                                                                  • API String ID: 838279627-0
                                                                                  • Opcode ID: 1fb226bea4766d57f7a8e470fa7a76bd52e6a24c9322a1d46433f0b513c7fff2
                                                                                  • Instruction ID: ac315beabce9997b34cc7e9447f6de52918611d2cabc5d876aa52f22a9d9051b
                                                                                  • Opcode Fuzzy Hash: 1fb226bea4766d57f7a8e470fa7a76bd52e6a24c9322a1d46433f0b513c7fff2
                                                                                  • Instruction Fuzzy Hash: AEB17BB5900269EFCF11DF98D880AEEBBB9FF58314F144019E845AB211D734AE52CBB0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: _strcspn$H_prolog3_ctype
                                                                                  • String ID:
                                                                                  • API String ID: 838279627-0
                                                                                  • Opcode ID: 2000cb31bee12d0d8e6a3e413ddf2789f3cba781778441f2713c9e538b817f8b
                                                                                  • Instruction ID: 4ee56342ca4f2635b0ebb8c32c8e43d49e3813ccf09e5a18bcb6151f28355936
                                                                                  • Opcode Fuzzy Hash: 2000cb31bee12d0d8e6a3e413ddf2789f3cba781778441f2713c9e538b817f8b
                                                                                  • Instruction Fuzzy Hash: 15B15F75D00249EFDF10DF98D941AEEBBBAEF18310F144419E845A7216DB70AE81CBB0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: AdjustPointer
                                                                                  • String ID:
                                                                                  • API String ID: 1740715915-0
                                                                                  • Opcode ID: 497042ec968f193ee5b89a65f9e529d4dfc32ce9befbf9ac307040071c184230
                                                                                  • Instruction ID: 99e36d97bb5dc5da31c9fd5487bcb7ac1a2fc76d6bba901e4dc3d12ff32f74ca
                                                                                  • Opcode Fuzzy Hash: 497042ec968f193ee5b89a65f9e529d4dfc32ce9befbf9ac307040071c184230
                                                                                  • Instruction Fuzzy Hash: E151E572600B06DFDB298F14E841B7AB7A4EF44310F18462DED4587299E731EC80DBB0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 49279b589aafa5168b3afeed1d12b95fda99fbbe2d5d3a19372ffda5fd60cba4
                                                                                  • Instruction ID: f47300cfc4abdf1f06c2e1dc9d04ac92ca6d6442cda2f79be59efad0fdda86d3
                                                                                  • Opcode Fuzzy Hash: 49279b589aafa5168b3afeed1d12b95fda99fbbe2d5d3a19372ffda5fd60cba4
                                                                                  • Instruction Fuzzy Hash: C221AC71604605AF9B20AF61DC62D7A77A9FF443A4B944925F825D7291EB30ED009BB0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(?,?,00000002,80004005,S-1-5-18,00000008), ref: 00D16FB7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast
                                                                                  • String ID: > returned:$Call to ShellExecute() for verb<$Last error=
                                                                                  • API String ID: 1452528299-1781106413
                                                                                  • Opcode ID: e5f923ecd393eadbc78cbcafd32834b3c59cecd686ffacaafc80300e435f375b
                                                                                  • Instruction ID: 75b178c0e19803bb642c2b70b42a031398f2da08e07d15c1f85067aed2d340d6
                                                                                  • Opcode Fuzzy Hash: e5f923ecd393eadbc78cbcafd32834b3c59cecd686ffacaafc80300e435f375b
                                                                                  • Instruction Fuzzy Hash: C9218049B1036197CB301F28A401379A2F0EF58B54F69046FE8C9D7390EE698CC283B5
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000004,00000080,00000000), ref: 00D1CD1C
                                                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,40000000,00000001,00000000,00000004,00000080,00000000), ref: 00D1CD3C
                                                                                  • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00D1CD6D
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00D1CD86
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$CloseCreateHandlePointerWrite
                                                                                  • String ID:
                                                                                  • API String ID: 3604237281-0
                                                                                  • Opcode ID: 54434326df0f8acfe99fd4a3374c7b6049366953ed8aac8a242c914e36a0431b
                                                                                  • Instruction ID: 17ce8c2090cd06c0f120a0fdda3efc2c86b45da323addc66aa7adbf6b3d2487b
                                                                                  • Opcode Fuzzy Hash: 54434326df0f8acfe99fd4a3374c7b6049366953ed8aac8a242c914e36a0431b
                                                                                  • Instruction Fuzzy Hash: D3217F70941315AFD7208F54EC0AFAABBB8EB05B25F214269F911A73D0DBB46A0487F4
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D1D7EE
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D1D7F8
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D1D849
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D1D869
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                  • String ID:
                                                                                  • API String ID: 2854358121-0
                                                                                  • Opcode ID: 9564ae6d3583915a91b53249a54c8e1d8720d006ae079dcfbd2ca79de3e742aa
                                                                                  • Instruction ID: 58594b37db2444809d46b7038c734328e96a628964058119c66c92e094a86d21
                                                                                  • Opcode Fuzzy Hash: 9564ae6d3583915a91b53249a54c8e1d8720d006ae079dcfbd2ca79de3e742aa
                                                                                  • Instruction Fuzzy Hash: 2501C075D00225AFCB15EB60F8426EEB7A2EF94724F280409F401AB392DF709E81C7B1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D227A9
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D227B3
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D22804
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D22824
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                  • String ID:
                                                                                  • API String ID: 2854358121-0
                                                                                  • Opcode ID: a3efbbd1bf967d08053f5d9806d0c4419c80661beada68b6cbbab52f3d5d7cd6
                                                                                  • Instruction ID: 1f006c2539939cbf68023ddf38d54dddccdc436a47caa78a7e71e87d34c537f1
                                                                                  • Opcode Fuzzy Hash: a3efbbd1bf967d08053f5d9806d0c4419c80661beada68b6cbbab52f3d5d7cd6
                                                                                  • Instruction Fuzzy Hash: D601C435900225ABCB05EB64B9116BEB772FFA4724F240509F801AB392DF749E01CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D1D759
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D1D763
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D1D7B4
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D1D7D4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                  • String ID:
                                                                                  • API String ID: 2854358121-0
                                                                                  • Opcode ID: 9b1acc2819ee789aa06a0aaf61c590aa88a383ba7cb3734b8ad5c57c1c5420b3
                                                                                  • Instruction ID: 14f63be3eaddeb8825babda22ce651b26ae5b96e697d35e563f9897d812c73f0
                                                                                  • Opcode Fuzzy Hash: 9b1acc2819ee789aa06a0aaf61c590aa88a383ba7cb3734b8ad5c57c1c5420b3
                                                                                  • Instruction Fuzzy Hash: E401D635900215AFCB05EB60F9516EE77A2EF94314F280509F812AB3D2DF709E40D7B1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D22714
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D2271E
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D2276F
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D2278F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                  • String ID:
                                                                                  • API String ID: 2854358121-0
                                                                                  • Opcode ID: 7f93d3abdeabaceb635ea64052b069f74d102a277e3456f02503d238e18414d8
                                                                                  • Instruction ID: 904f33d1e1fb8da6875f986339e8ca8293199e9da825ef70e276dd3b9a144289
                                                                                  • Opcode Fuzzy Hash: 7f93d3abdeabaceb635ea64052b069f74d102a277e3456f02503d238e18414d8
                                                                                  • Instruction Fuzzy Hash: 3D01D675900225EBCB05EB60F8056BEB772FF94715F280509F810AB392CF749E019BB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D228D3
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D228DD
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D2292E
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D2294E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                  • String ID:
                                                                                  • API String ID: 2854358121-0
                                                                                  • Opcode ID: 7dca87f104672b801dfbc670ded87f35421e382529ed4cb9fe2a4eed6cacc373
                                                                                  • Instruction ID: 75390cf15489ee40e0b1285e752701729c743c2766ebb75c74825325b515700d
                                                                                  • Opcode Fuzzy Hash: 7dca87f104672b801dfbc670ded87f35421e382529ed4cb9fe2a4eed6cacc373
                                                                                  • Instruction Fuzzy Hash: 7401C475900225ABCB05EB60B9116BE7772EF94724F280509F410AB392CF749E41CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D2283E
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D22848
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D22899
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D228B9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                  • String ID:
                                                                                  • API String ID: 2854358121-0
                                                                                  • Opcode ID: 80ef1477a70aa68749750e098deb648d1fcb2e10268d12d48d5105f653599521
                                                                                  • Instruction ID: 53d9f09e1d7fd35cb942be74ce382282b3527b88042942a28493ea217706d871
                                                                                  • Opcode Fuzzy Hash: 80ef1477a70aa68749750e098deb648d1fcb2e10268d12d48d5105f653599521
                                                                                  • Instruction Fuzzy Hash: 2E01A175900225ABCB05EB60F9116BEB762FF94714F240509F400AB392DF74DA008BB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D2E974
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D2E97E
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D2E9CF
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D2E9EF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                  • String ID:
                                                                                  • API String ID: 2854358121-0
                                                                                  • Opcode ID: 233751a7d1f38bc8e2404e190d1a2f7d6be876235fc03ff652d64327b926dbc4
                                                                                  • Instruction ID: a55498787e172d591b1031fa533ab2e1f24bf739b29499e5947978f965d2c9eb
                                                                                  • Opcode Fuzzy Hash: 233751a7d1f38bc8e2404e190d1a2f7d6be876235fc03ff652d64327b926dbc4
                                                                                  • Instruction Fuzzy Hash: E201D6359002259BCB05EB64F9016FEB766EF94314F29050AF410AB392CF709E40CFB5
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D2EA09
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D2EA13
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D2EA64
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D2EA84
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                  • String ID:
                                                                                  • API String ID: 2854358121-0
                                                                                  • Opcode ID: c2941ed4ea0098a32da15ebac33b97d3b47ee88cf9166a46e15769848f64095d
                                                                                  • Instruction ID: 6289f47b9401023a8b7886ac01cdc7f154cc50790ca781c1ee9fb3442ab5a863
                                                                                  • Opcode Fuzzy Hash: c2941ed4ea0098a32da15ebac33b97d3b47ee88cf9166a46e15769848f64095d
                                                                                  • Instruction Fuzzy Hash: 6F01D235D002259FCB05EB64F9516AEBB62FFA4714F290509F800AB392DF709E408BB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D2EBC8
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D2EBD2
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D2EC23
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D2EC43
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                  • String ID:
                                                                                  • API String ID: 2854358121-0
                                                                                  • Opcode ID: ed1f0f64a4113181ae453dc82e023884812b5b78be3eed3202391ae676d97122
                                                                                  • Instruction ID: 40912e75d71b5213a43fadf53009b08296d9d98882e2965fd018ba1ee49fba32
                                                                                  • Opcode Fuzzy Hash: ed1f0f64a4113181ae453dc82e023884812b5b78be3eed3202391ae676d97122
                                                                                  • Instruction Fuzzy Hash: 5701C435A002259BCB15EBA0F9056BE7772EF94324F280549F410AB3D2DF709E009BB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D22BBC
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D22BC6
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D22C17
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D22C37
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                  • String ID:
                                                                                  • API String ID: 2854358121-0
                                                                                  • Opcode ID: 9aae07a85eea510cd965d66b0ea796e12c8455bb41ffa97e12c21f757a979d0c
                                                                                  • Instruction ID: d1c1a3ff3ceb78314d5a6b56c12ab0c653f4c4d590291aa4af553db8abebdba2
                                                                                  • Opcode Fuzzy Hash: 9aae07a85eea510cd965d66b0ea796e12c8455bb41ffa97e12c21f757a979d0c
                                                                                  • Instruction Fuzzy Hash: 6501D635900229EBCB15EB64F9016BEB772EFA4314F250409F800AB392CF749E00DBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D22CE6
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D22CF0
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D22D41
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D22D61
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                  • String ID:
                                                                                  • API String ID: 2854358121-0
                                                                                  • Opcode ID: 79bc2a4ea3aebc342a75d874b1cfe4cd7cc8abe463d6fd88a891db293e1275b8
                                                                                  • Instruction ID: 51f400cfc0b81cb0548100f1c5f2174413650629c839cde515556fa0e8982a05
                                                                                  • Opcode Fuzzy Hash: 79bc2a4ea3aebc342a75d874b1cfe4cd7cc8abe463d6fd88a891db293e1275b8
                                                                                  • Instruction Fuzzy Hash: B101C035900229ABCB15EB60F9416BEB772FF94714F280509F800AB392DFB09E418BF1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D2EC5D
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D2EC67
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D2ECB8
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D2ECD8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                  • String ID:
                                                                                  • API String ID: 2854358121-0
                                                                                  • Opcode ID: 677feb5fc0a77ab02fe23c6f7f29a7248c834930ed511969426e57e99880f288
                                                                                  • Instruction ID: cc2f14750d062e96d7da79c1603a5584ef27321898c65cc51cea80586272fbbc
                                                                                  • Opcode Fuzzy Hash: 677feb5fc0a77ab02fe23c6f7f29a7248c834930ed511969426e57e99880f288
                                                                                  • Instruction Fuzzy Hash: F201C035A00225DBCB05EBA4F8516AEBB72FF94324F280409F401AB392DF709E419BB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D22C51
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D22C5B
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D22CAC
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D22CCC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                  • String ID:
                                                                                  • API String ID: 2854358121-0
                                                                                  • Opcode ID: 104eda206c6b197bc325e170be1c476ca517f10fd885872525ff20712b76358f
                                                                                  • Instruction ID: 3e6afb885557800238843c0afe6df715218dd36f2c298dcf7cb29f9d9d3c8d1f
                                                                                  • Opcode Fuzzy Hash: 104eda206c6b197bc325e170be1c476ca517f10fd885872525ff20712b76358f
                                                                                  • Instruction Fuzzy Hash: D601D675901225EFCB15EB64F9016BE7772EF94714F250409F401AB391CF759E409BB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D22EA5
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D22EAF
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D22F00
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D22F20
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                  • String ID:
                                                                                  • API String ID: 2854358121-0
                                                                                  • Opcode ID: bcd6b27455ffbda3a57e7ec852c4ae8579443fdb2a180e626b5d27145609205c
                                                                                  • Instruction ID: 7391dd00b439ff263fe063cdd109ec2fb2827c8bf71d6c15a651b0a272e0bd45
                                                                                  • Opcode Fuzzy Hash: bcd6b27455ffbda3a57e7ec852c4ae8579443fdb2a180e626b5d27145609205c
                                                                                  • Instruction Fuzzy Hash: 3C01C435900225ABCB05EB60F9016BE7772FFA4314F250509F810AB392CF709E00CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D22E10
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D22E1A
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D22E6B
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D22E8B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                  • String ID:
                                                                                  • API String ID: 2854358121-0
                                                                                  • Opcode ID: 59440dc173830f8090a9343c24a127def7a9d94f1edd9e162fc27728738e126b
                                                                                  • Instruction ID: 15eae1d4fb07c674fba86f0a559c4c04f3c23d285d4b4a0f70437da13d8aff52
                                                                                  • Opcode Fuzzy Hash: 59440dc173830f8090a9343c24a127def7a9d94f1edd9e162fc27728738e126b
                                                                                  • Instruction Fuzzy Hash: CD01DB35900225EBCB05EB64F4016BEB772FF64714F250909F8106B391DF709E409BB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3.LIBCMT ref: 00D22F3A
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D22F44
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::_Lockit.LIBCPMT ref: 00D18C50
                                                                                    • Part of subcall function 00D18C20: std::_Lockit::~_Lockit.LIBCPMT ref: 00D18C78
                                                                                  • std::_Facet_Register.LIBCPMT ref: 00D22F95
                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00D22FB5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                                                  • String ID:
                                                                                  • API String ID: 2854358121-0
                                                                                  • Opcode ID: 29080daa6c0acadcdd1c3afb2d51315d4d990f91be3830afda2f7a39a0c54a20
                                                                                  • Instruction ID: 4105fbd28acf7ba530c9e4d79994f6d821f1096f8f0ecd6847dcb9699f8cd933
                                                                                  • Opcode Fuzzy Hash: 29080daa6c0acadcdd1c3afb2d51315d4d990f91be3830afda2f7a39a0c54a20
                                                                                  • Instruction Fuzzy Hash: B7018435900225EBCB15EB64B9116BEB776FFA8714F250509F801AB392DF749E408BB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • WriteConsoleW.KERNEL32 ref: 00D5369D
                                                                                  • GetLastError.KERNEL32(?,00D53053,?,00000001,?,?,?,00D52198,?,?,00000000,?,?,?,00D5271F,?), ref: 00D536A9
                                                                                    • Part of subcall function 00D5366F: CloseHandle.KERNEL32(FFFFFFFE), ref: 00D5367F
                                                                                  • ___initconout.LIBCMT ref: 00D536B9
                                                                                    • Part of subcall function 00D53631: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000), ref: 00D53644
                                                                                  • WriteConsoleW.KERNEL32 ref: 00D536CE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                  • String ID:
                                                                                  • API String ID: 2744216297-0
                                                                                  • Opcode ID: 8e4db491358f6bcf7cf6207ac0496d165a110ef5201b029688ca30c48d33507c
                                                                                  • Instruction ID: 939c9eb8acea5833be551790c26b54eeb2c439dc841aca7d8b0287ecbc61d9bc
                                                                                  • Opcode Fuzzy Hash: 8e4db491358f6bcf7cf6207ac0496d165a110ef5201b029688ca30c48d33507c
                                                                                  • Instruction Fuzzy Hash: B3F01C36504358BBCF622FD9EC049993F66FB083E2B144454FE19DA320C6328920EBB0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3_GS.LIBCMT ref: 00D1EC8E
                                                                                    • Part of subcall function 00D1D87C: __EH_prolog3.LIBCMT ref: 00D1D883
                                                                                    • Part of subcall function 00D1D87C: std::_Lockit::_Lockit.LIBCPMT ref: 00D1D88D
                                                                                    • Part of subcall function 00D1D87C: std::_Lockit::~_Lockit.LIBCPMT ref: 00D1D8FE
                                                                                  • _Find_elem.LIBCPMT ref: 00D1EE8A
                                                                                  Strings
                                                                                  • 0123456789ABCDEFabcdef-+Xx, xrefs: 00D1ECF6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Lockitstd::_$Find_elemH_prolog3H_prolog3_Lockit::_Lockit::~_
                                                                                  • String ID: 0123456789ABCDEFabcdef-+Xx
                                                                                  • API String ID: 2544715827-2799312399
                                                                                  • Opcode ID: b86a3cc0e0e4d3a886acd402f4434032ab7e56e33c207c736459b7db8d334721
                                                                                  • Instruction ID: 6cbcbcd2cf2c68b4fea7cfb9433736f03cd8be6ca72d6762b5a6c32d5b5c7b14
                                                                                  • Opcode Fuzzy Hash: b86a3cc0e0e4d3a886acd402f4434032ab7e56e33c207c736459b7db8d334721
                                                                                  • Instruction Fuzzy Hash: C4C15F34E04298AADF15DBA4E5507ECBBB2AF55300F284069EC856B287DF319DC6CB71
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3_GS.LIBCMT ref: 00D262C8
                                                                                    • Part of subcall function 00D22D74: __EH_prolog3.LIBCMT ref: 00D22D7B
                                                                                    • Part of subcall function 00D22D74: std::_Lockit::_Lockit.LIBCPMT ref: 00D22D85
                                                                                    • Part of subcall function 00D22D74: std::_Lockit::~_Lockit.LIBCPMT ref: 00D22DF6
                                                                                  • _Find_elem.LIBCPMT ref: 00D26502
                                                                                  Strings
                                                                                  • 0123456789ABCDEFabcdef-+Xx, xrefs: 00D2633F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Lockitstd::_$Find_elemH_prolog3H_prolog3_Lockit::_Lockit::~_
                                                                                  • String ID: 0123456789ABCDEFabcdef-+Xx
                                                                                  • API String ID: 2544715827-2799312399
                                                                                  • Opcode ID: 13ea2dedce409de26b6abfe844ba262d1c1c14287c9a4d84aae3fe0a530f4b38
                                                                                  • Instruction ID: 4630475be059df7a51bbec72c098ceb677022a93136e6b065406ed1609d65c45
                                                                                  • Opcode Fuzzy Hash: 13ea2dedce409de26b6abfe844ba262d1c1c14287c9a4d84aae3fe0a530f4b38
                                                                                  • Instruction Fuzzy Hash: B1C18470E043788ADF25DF68E8517ACBBB1BF21308F584099D885AB286DB35DD85DB70
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3_GS.LIBCMT ref: 00D2669E
                                                                                    • Part of subcall function 00D1B8B0: std::_Lockit::_Lockit.LIBCPMT ref: 00D1B8DD
                                                                                    • Part of subcall function 00D1B8B0: std::_Lockit::_Lockit.LIBCPMT ref: 00D1B900
                                                                                    • Part of subcall function 00D1B8B0: std::_Lockit::~_Lockit.LIBCPMT ref: 00D1B928
                                                                                    • Part of subcall function 00D1B8B0: std::_Lockit::~_Lockit.LIBCPMT ref: 00D1B9B7
                                                                                  • _Find_elem.LIBCPMT ref: 00D268D8
                                                                                  Strings
                                                                                  • 0123456789ABCDEFabcdef-+Xx, xrefs: 00D26715
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$Find_elemH_prolog3_
                                                                                  • String ID: 0123456789ABCDEFabcdef-+Xx
                                                                                  • API String ID: 3042121994-2799312399
                                                                                  • Opcode ID: 18afea134a2c8acf14d9665ad428fb72c84b202b011ea88926aa0f0367a6c912
                                                                                  • Instruction ID: e6207ad3aa72ee2f91767e0c40dc2005b1eef386efa2d1970da9b2e40f932df8
                                                                                  • Opcode Fuzzy Hash: 18afea134a2c8acf14d9665ad428fb72c84b202b011ea88926aa0f0367a6c912
                                                                                  • Instruction Fuzzy Hash: E4C16370D043788ADF15DF64E8517ACBBB2BF65308F588099D885AB282DB34DD85DB70
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • _wcschr.LIBVCRUNTIME ref: 00D4BB30
                                                                                    • Part of subcall function 00D37044: IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00D37046
                                                                                    • Part of subcall function 00D37044: GetCurrentProcess.KERNEL32(C0000417,00D6A078,?,00000000,?,?,?,00D43583,00D6A078,0000000C,00D43841,?), ref: 00D37069
                                                                                    • Part of subcall function 00D37044: TerminateProcess.KERNEL32(00000000,?,00D43583,00D6A078,0000000C,00D43841,?), ref: 00D37070
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CurrentFeaturePresentProcessorTerminate_wcschr
                                                                                  • String ID: G
                                                                                  • API String ID: 606420371-2458028032
                                                                                  • Opcode ID: 731411f6c8ab6d88dc774a84d9b6839a151af71538b3d45f5e498e1c5132e61c
                                                                                  • Instruction ID: 42c0ee2b66dc182decaaa1797383104ea084e043f0463f888808abd589610ca5
                                                                                  • Opcode Fuzzy Hash: 731411f6c8ab6d88dc774a84d9b6839a151af71538b3d45f5e498e1c5132e61c
                                                                                  • Instruction Fuzzy Hash: 0E61F5B1D00704ABCB206F78D882A6E77A4EF25370F18456FF912DB286EB74D9009B70
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __startOneArgErrorHandling.LIBCMT ref: 00D41AFD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorHandling__start
                                                                                  • String ID: pow
                                                                                  • API String ID: 3213639722-2276729525
                                                                                  • Opcode ID: 420c26160872de6c1eb300cad11f91846eac375f4b949e9f88ca430b6f89a426
                                                                                  • Instruction ID: 28126849c55eeb22c5cb2fe745de1d1ad4ae9aead61624b94e628f017eea2a8c
                                                                                  • Opcode Fuzzy Hash: 420c26160872de6c1eb300cad11f91846eac375f4b949e9f88ca430b6f89a426
                                                                                  • Instruction Fuzzy Hash: E6519B65A89302CBCB117F5CCD4537A7BA0EB01741F284958E4D1862E9FF318CC59A77
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: __aulldiv
                                                                                  • String ID: -$0123456789abcdefghijklmnopqrstuvwxyz
                                                                                  • API String ID: 3732870572-1956417402
                                                                                  • Opcode ID: 910ffd1e61834cf430d6903360d0a61ce8b5325204e8cd3421ecd184845b7082
                                                                                  • Instruction ID: fcad979a8be39c9ef14aecd8f2b756530cdb876234a9744439adc9727e122a9b
                                                                                  • Opcode Fuzzy Hash: 910ffd1e61834cf430d6903360d0a61ce8b5325204e8cd3421ecd184845b7082
                                                                                  • Instruction Fuzzy Hash: BF511579B042869BDF298FAC84817BEBBF9AF05341F18406AE891E7241C375D945CB71
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00D1BF6E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Concurrency::cancel_current_task
                                                                                  • String ID: false$true
                                                                                  • API String ID: 118556049-2658103896
                                                                                  • Opcode ID: 820d19b843e704e5ed47c35b17b3385fd017366cd457273ad6d9216ff14f626d
                                                                                  • Instruction ID: f7d4a9d6110e19a28f3ddb0b171a7d1ad93276c8c3f074add5a03b53fd6bb3ed
                                                                                  • Opcode Fuzzy Hash: 820d19b843e704e5ed47c35b17b3385fd017366cd457273ad6d9216ff14f626d
                                                                                  • Instruction Fuzzy Hash: 1651B3B5D007489FDB10CFA4D841BEEB7B8FF04314F14826AE845A7241EB74AA85CB71
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: \\?\$\\?\UNC\
                                                                                  • API String ID: 0-3019864461
                                                                                  • Opcode ID: 392a1bdc9c063d24136b062b8a514f206fb0a64eef0a45f8fea62dc3752c3043
                                                                                  • Instruction ID: 617282fccfad973eef4e25f110e84feadffcc38daf7383c1e676f73b04097890
                                                                                  • Opcode Fuzzy Hash: 392a1bdc9c063d24136b062b8a514f206fb0a64eef0a45f8fea62dc3752c3043
                                                                                  • Instruction Fuzzy Hash: B7518C70A04304ABDB14CF68E845BEEB7B5FF49704F145519E841A7291DBB5A9C8CBB0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3_GS.LIBCMT ref: 00D2D501
                                                                                  • _swprintf.LIBCMT ref: 00D2D573
                                                                                    • Part of subcall function 00D2254E: __EH_prolog3.LIBCMT ref: 00D22555
                                                                                    • Part of subcall function 00D2254E: std::_Lockit::_Lockit.LIBCPMT ref: 00D2255F
                                                                                    • Part of subcall function 00D2254E: std::_Lockit::~_Lockit.LIBCPMT ref: 00D225D0
                                                                                    • Part of subcall function 00D22FC8: __EH_prolog3.LIBCMT ref: 00D22FCF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: H_prolog3Lockitstd::_$H_prolog3_Lockit::_Lockit::~__swprintf
                                                                                  • String ID: %.0Lf
                                                                                  • API String ID: 3050236999-1402515088
                                                                                  • Opcode ID: 5ba02835cf5e9c5cd1db4afbed7e0b42552c2335be443955c1f9992a167cff64
                                                                                  • Instruction ID: 4230465d2c3046015102f0405658c219ec8bf8629a5cb39c2fe784cc58e9ed7a
                                                                                  • Opcode Fuzzy Hash: 5ba02835cf5e9c5cd1db4afbed7e0b42552c2335be443955c1f9992a167cff64
                                                                                  • Instruction Fuzzy Hash: A3416B71E00318ABCF05DFE4E845AEDBBB5FF19304F208449E846AB295DB759915CFA0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3_GS.LIBCMT ref: 00D2D7A5
                                                                                  • _swprintf.LIBCMT ref: 00D2D817
                                                                                    • Part of subcall function 00D18610: std::_Lockit::_Lockit.LIBCPMT ref: 00D18657
                                                                                    • Part of subcall function 00D18610: std::_Lockit::_Lockit.LIBCPMT ref: 00D18679
                                                                                    • Part of subcall function 00D18610: std::_Lockit::~_Lockit.LIBCPMT ref: 00D186A1
                                                                                    • Part of subcall function 00D18610: std::_Lockit::~_Lockit.LIBCPMT ref: 00D1880E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3__swprintf
                                                                                  • String ID: %.0Lf
                                                                                  • API String ID: 1487807907-1402515088
                                                                                  • Opcode ID: c09e3485d437b0c48c3c047941d7b2bfbb7d05236136e0e8b06204fe935aa5ed
                                                                                  • Instruction ID: 58755b946cb5f78b1b39e7e0cd54a5ea83fb4c5819d3a92f2e41df624f5c4c73
                                                                                  • Opcode Fuzzy Hash: c09e3485d437b0c48c3c047941d7b2bfbb7d05236136e0e8b06204fe935aa5ed
                                                                                  • Instruction Fuzzy Hash: 46417871E00318ABCF05DFE4E845ADEBBB5FF18304F204449E846AB295EB359955CFA0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • __EH_prolog3_GS.LIBCMT ref: 00D3188E
                                                                                  • _swprintf.LIBCMT ref: 00D31900
                                                                                    • Part of subcall function 00D19270: std::_Lockit::_Lockit.LIBCPMT ref: 00D192A0
                                                                                    • Part of subcall function 00D19270: std::_Lockit::_Lockit.LIBCPMT ref: 00D192C2
                                                                                    • Part of subcall function 00D19270: std::_Lockit::~_Lockit.LIBCPMT ref: 00D192EA
                                                                                    • Part of subcall function 00D19270: std::_Lockit::~_Lockit.LIBCPMT ref: 00D19422
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3__swprintf
                                                                                  • String ID: %.0Lf
                                                                                  • API String ID: 1487807907-1402515088
                                                                                  • Opcode ID: 3b6730938b426eb05f1f972200bbf77044bfaee7ff94cab5059c290b457011ed
                                                                                  • Instruction ID: 354507d67507daf7249aeb165dccac3bfab8244d76e12909493830ed3034ece2
                                                                                  • Opcode Fuzzy Hash: 3b6730938b426eb05f1f972200bbf77044bfaee7ff94cab5059c290b457011ed
                                                                                  • Instruction Fuzzy Hash: 23418875E00309ABCF05DFE4D855ADDBBB5FF08300F208449E856AB2A1DB359A59CFA4
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 00D3607E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: EncodePointer
                                                                                  • String ID: MOC$RCC
                                                                                  • API String ID: 2118026453-2084237596
                                                                                  • Opcode ID: 299f65880ab7f204bd81ce2cdb0c8486f5310b2c87790bd91c9472e48d0bd3b9
                                                                                  • Instruction ID: bfd914f5bf09c1ea6471a1908341d4de5cc94ffc9ffe1bc5031720a47146599a
                                                                                  • Opcode Fuzzy Hash: 299f65880ab7f204bd81ce2cdb0c8486f5310b2c87790bd91c9472e48d0bd3b9
                                                                                  • Instruction Fuzzy Hash: 16413671900209FFCF15DF98DD81AAEBBB5EF48304F188159F908A7252D235D951DB60
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: H_prolog3___cftoe
                                                                                  • String ID: !%x
                                                                                  • API String ID: 855520168-1893981228
                                                                                  • Opcode ID: e02282dc4c552ddb7946ade5ce06a6442755b6818e104d1c668d14899c295de4
                                                                                  • Instruction ID: 2a3f93f6b8c350b0ee38c4a1016410bc51d37252ed5abe1ce29bec0786098edb
                                                                                  • Opcode Fuzzy Hash: e02282dc4c552ddb7946ade5ce06a6442755b6818e104d1c668d14899c295de4
                                                                                  • Instruction Fuzzy Hash: CA316671D00219EBDF04DF94EA81AEEB7B6FF18308F204419F905A7251DB75AA46CB74
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: H_prolog3___cftoe
                                                                                  • String ID: !%x
                                                                                  • API String ID: 855520168-1893981228
                                                                                  • Opcode ID: 30c10768a4cb41472d9573ebe97dd5cfecf34eb04e922402dd6a1950ba91218c
                                                                                  • Instruction ID: 52da2664415f927f19f6d771b6438864c38957690eb2b577e027c5068563ee30
                                                                                  • Opcode Fuzzy Hash: 30c10768a4cb41472d9573ebe97dd5cfecf34eb04e922402dd6a1950ba91218c
                                                                                  • Instruction Fuzzy Hash: 7F319836D05259AFEF00DF98E881AEEBBB5EF18305F14001AF844A7242D7759A46CBB0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • ConvertSidToStringSidW.ADVAPI32(?,00000000), ref: 00D15F86
                                                                                  • LocalFree.KERNEL32(00000000,Invalid SID,0000000B,?,00000000,F83EBEA6), ref: 00D15FF6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: ConvertFreeLocalString
                                                                                  • String ID: Invalid SID
                                                                                  • API String ID: 3201929900-130637731
                                                                                  • Opcode ID: 4acbc82f7be25b9651803922e81c4f2de7e8e12a4e0536ac1da40c8478083926
                                                                                  • Instruction ID: 9101a5cf93d790c2c337ace829ac6804eb842a2612c0fc59e5fcf0831792d647
                                                                                  • Opcode Fuzzy Hash: 4acbc82f7be25b9651803922e81c4f2de7e8e12a4e0536ac1da40c8478083926
                                                                                  • Instruction Fuzzy Hash: DF218E74A04705EBDB14CF58E815BAFBBF8EF44714F14051DE801A7380DBBAAA458BE0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00D1909B
                                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00D190FE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                                                  • String ID: bad locale name
                                                                                  • API String ID: 3988782225-1405518554
                                                                                  • Opcode ID: 362ce761a51f4c3d5e431e914f452d2980f9ad1eba6ee4833b6c643fc0d1720f
                                                                                  • Instruction ID: 243fa6884664653d642469756b66fa4a70ced97604e4d301fa0a6f96be4dcb61
                                                                                  • Opcode Fuzzy Hash: 362ce761a51f4c3d5e431e914f452d2980f9ad1eba6ee4833b6c643fc0d1720f
                                                                                  • Instruction Fuzzy Hash: CE21DE70805B84EED721CFA8C90478BBFE4EF19314F10868DE49597781D7B5A6088BB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: H_prolog3_
                                                                                  • String ID: false$true
                                                                                  • API String ID: 2427045233-2658103896
                                                                                  • Opcode ID: 40f4b9f8dc74a57dc374c19387f3354617dd82d87507c3b2073efca423e285e6
                                                                                  • Instruction ID: 8f30277ef8726f2f348fb156d0c2d4599c2c0fdc77e418287e074dae92290560
                                                                                  • Opcode Fuzzy Hash: 40f4b9f8dc74a57dc374c19387f3354617dd82d87507c3b2073efca423e285e6
                                                                                  • Instruction Fuzzy Hash: F0118175941745AFC720EFB4E441BCAB7F4AF19300F14C52AF49697242EA30E5848B70
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • LocalFree.KERNEL32(00000000,00D14261,00D54400,000000FF,F83EBEA6,00000000,?,00000000,?,?,?,00D54400,000000FF,?,00D13A75,?), ref: 00D14096
                                                                                  • LocalAlloc.KERNEL32(00000040,40000022,F83EBEA6,?,?,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00D14154
                                                                                  • LocalAlloc.KERNEL32(00000040,3FFFFFFF,F83EBEA6,?,?,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00D14177
                                                                                  • LocalFree.KERNEL32(?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00D14217
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Local$AllocFree
                                                                                  • String ID:
                                                                                  • API String ID: 2012307162-0
                                                                                  • Opcode ID: ab8b8b2c6fc739a7a14ea78957beb88e5ead78cd7c8853709156ffe4330a1e45
                                                                                  • Instruction ID: 8b5ae66465bf1afa7d1a5152d288be917b9f068a32a0cf7139df2c426ce5c7a5
                                                                                  • Opcode Fuzzy Hash: ab8b8b2c6fc739a7a14ea78957beb88e5ead78cd7c8853709156ffe4330a1e45
                                                                                  • Instruction Fuzzy Hash: F1518675A00205AFDB18DF6CD985AAEBBB5FB48350F14462DF915E7380DB31AD80CB64
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • LocalAlloc.KERNEL32(00000040,80000022,00000000,?,00000000), ref: 00D11E01
                                                                                  • LocalAlloc.KERNEL32(00000040,7FFFFFFF,00000000,?,00000000), ref: 00D11E21
                                                                                  • LocalFree.KERNEL32(7FFFFFFE,?,00000000), ref: 00D11EA7
                                                                                  • LocalFree.KERNEL32(00000001,F83EBEA6,00000000,00000000,00D53C40,000000FF,?,00000000), ref: 00D11F2D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.447210235.0000000000D11000.00000020.00000001.01000000.00000005.sdmp, Offset: 00D10000, based on PE: true
                                                                                  • Associated: 00000007.00000002.447205918.0000000000D10000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447220101.0000000000D57000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447225552.0000000000D6C000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                  • Associated: 00000007.00000002.447230127.0000000000D70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_d10000_MSI1B42.jbxd
                                                                                  Similarity
                                                                                  • API ID: Local$AllocFree
                                                                                  • String ID:
                                                                                  • API String ID: 2012307162-0
                                                                                  • Opcode ID: 184ac80fecdece0c863c4d9eb834f833ec67a4a2c37f7d05ebabd0a87fb12c89
                                                                                  • Instruction ID: bc0746520d12ccad55ccab217525ffb3c5597f4e474b581ab4b49914a733bc65
                                                                                  • Opcode Fuzzy Hash: 184ac80fecdece0c863c4d9eb834f833ec67a4a2c37f7d05ebabd0a87fb12c89
                                                                                  • Instruction Fuzzy Hash: 5651D476508315AFC715DF68E840AABB7E8FB48350F140A6EF956D7390DB30D98487B1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Execution Graph

                                                                                  Execution Coverage:1.3%
                                                                                  Dynamic/Decrypted Code Coverage:98.1%
                                                                                  Signature Coverage:4.8%
                                                                                  Total number of Nodes:374
                                                                                  Total number of Limit Nodes:12
                                                                                  execution_graph 50407 133ce4 50410 133cb4 50407->50410 50416 133868 50410->50416 50412 133cdb 50413 133cbd 50413->50412 50414 133ccf 50413->50414 50414->50413 50448 13cb54 NtDelayExecution 50414->50448 50417 133888 50416->50417 50449 136328 50417->50449 50419 133891 50419->50413 50420 13388d 50420->50419 50461 138560 50420->50461 50424 1338bc 50424->50419 50425 138820 4 API calls 50424->50425 50426 1338d7 50425->50426 50426->50419 50427 1338ed GetCurrentProcess IsWow64Process 50426->50427 50427->50419 50428 13391a 50427->50428 50472 1368e8 GetAdaptersInfo 50428->50472 50430 13391f 50430->50419 50431 133959 CreateMutexW 50430->50431 50431->50419 50432 133979 GetLastError 50431->50432 50432->50419 50433 13399c GetModuleHandleW 50432->50433 50479 13463c GetModuleHandleW GetCurrentProcessId 50433->50479 50437 1339c1 50437->50419 50507 136864 NtAllocateVirtualMemory 50437->50507 50439 1339d1 50439->50419 50508 13d134 17 API calls new[] 50439->50508 50441 1339e1 50509 13378c 50441->50509 50445 1339f9 50574 136250 CreateThread 50445->50574 50447 133a11 50447->50419 50448->50414 50451 136331 50449->50451 50450 136367 50450->50420 50451->50450 50575 13a59c GetProcAddress 50451->50575 50453 136343 50453->50450 50576 139484 GetProcAddress 50453->50576 50455 13634c 50455->50450 50577 13a47c 50455->50577 50459 13635e 50459->50450 50582 13ac50 GetProcAddress 50459->50582 50462 13857e 50461->50462 50463 138590 RtlGetVersion 50462->50463 50464 13859b 50462->50464 50463->50464 50465 1385a5 GetVersionExW 50464->50465 50466 1338b3 50464->50466 50465->50466 50467 138820 CreateToolhelp32Snapshot 50466->50467 50468 13ae1c 50467->50468 50469 138850 Process32FirstW 50468->50469 50470 13888a CloseHandle 50469->50470 50471 13886c Process32NextW 50469->50471 50470->50424 50471->50470 50471->50471 50473 136921 50472->50473 50474 136945 50472->50474 50475 13ad34 NtAllocateVirtualMemory 50473->50475 50476 136953 50474->50476 50478 137b40 NtFreeVirtualMemory 50474->50478 50477 13692c GetAdaptersInfo 50475->50477 50476->50430 50477->50474 50478->50476 50625 137b80 50479->50625 50483 138560 2 API calls 50497 134690 50483->50497 50484 134743 GetCurrentProcessId 50484->50497 50485 13478d GetCurrentProcessId OpenProcess 50487 1347b4 NtQueryInformationProcess 50485->50487 50485->50497 50490 134b27 CloseHandle 50487->50490 50487->50497 50488 134c23 50636 134c38 CloseHandle NtFreeVirtualMemory 50488->50636 50489 1339b1 50489->50419 50506 136988 NtAllocateVirtualMemory 50489->50506 50490->50497 50492 13476b 50492->50485 50635 13841c NtFreeVirtualMemory GetModuleFileNameW NtAllocateVirtualMemory 50492->50635 50493 13482a ReadProcessMemory 50493->50490 50495 134881 ReadProcessMemory 50493->50495 50494 134b3c 50496 13bb2c NtAllocateVirtualMemory 50494->50496 50503 134c12 50494->50503 50495->50490 50495->50497 50499 134b71 50496->50499 50497->50483 50497->50484 50497->50485 50497->50490 50497->50492 50497->50493 50497->50494 50498 13ad34 NtAllocateVirtualMemory 50497->50498 50500 134907 WideCharToMultiByte 50498->50500 50501 137b40 NtFreeVirtualMemory 50499->50501 50499->50503 50505 13496a 50500->50505 50501->50503 50502 136298 MultiByteToWideChar NtAllocateVirtualMemory 50502->50505 50503->50488 50503->50489 50504 137b40 NtFreeVirtualMemory 50504->50490 50505->50502 50505->50504 50506->50437 50507->50439 50508->50441 50659 133250 50509->50659 50512 1337b3 50512->50445 50518 1333ac 50512->50518 50519 1330d0 12 API calls 50518->50519 50520 1333f7 50519->50520 50521 133250 12 API calls 50520->50521 50564 133404 50520->50564 50522 133410 50521->50522 50523 13bb2c NtAllocateVirtualMemory 50522->50523 50522->50564 50524 133437 50523->50524 50525 136b9c 3 API calls 50524->50525 50526 133446 50525->50526 50527 136b9c 3 API calls 50526->50527 50528 133450 50527->50528 50770 137588 50528->50770 50531 133712 50533 137b40 NtFreeVirtualMemory 50531->50533 50532 133462 50534 13bb2c NtAllocateVirtualMemory 50532->50534 50533->50564 50535 13347c 50534->50535 50536 136b9c 3 API calls 50535->50536 50537 13348b 50536->50537 50778 137504 11 API calls 50537->50778 50539 13349d 50540 1334dd wsprintfW 50539->50540 50539->50564 50541 133597 50540->50541 50542 1334fd 50540->50542 50544 1335cc wsprintfW 50541->50544 50543 133532 wsprintfW 50542->50543 50545 13355e 50543->50545 50546 1335f3 50544->50546 50548 13357f wsprintfW 50545->50548 50547 133614 wsprintfW 50546->50547 50549 13363f 50547->50549 50548->50549 50779 133728 50549->50779 50552 137b40 NtFreeVirtualMemory 50553 133668 50552->50553 50554 137b40 NtFreeVirtualMemory 50553->50554 50555 133672 50554->50555 50556 137b40 NtFreeVirtualMemory 50555->50556 50557 13367f 50556->50557 50786 133c2c 50557->50786 50562 13ad34 NtAllocateVirtualMemory 50563 13369f 50562->50563 50563->50564 50565 13ba98 3 API calls 50563->50565 50564->50445 50566 1336be 50565->50566 50567 1336ea 50566->50567 50568 13ba98 3 API calls 50566->50568 50806 13b400 50567->50806 50570 1336d8 50568->50570 50572 13ba98 3 API calls 50570->50572 50572->50567 50573 137b40 NtFreeVirtualMemory 50573->50564 50574->50447 50575->50453 50576->50455 50580 13a53f 50577->50580 50578 136355 50578->50450 50581 13904c GetProcAddress 50578->50581 50580->50578 50583 13a350 50580->50583 50581->50459 50582->50450 50595 138a94 50583->50595 50585 13a36d 50585->50580 50586 13a360 50586->50585 50601 13ba98 50586->50601 50588 13a3af 50588->50585 50589 13a3d5 FindFirstFileW 50588->50589 50590 13a413 50589->50590 50593 13a3f5 50589->50593 50605 137b40 50590->50605 50591 13a3fc FindNextFileW 50591->50590 50591->50593 50593->50590 50593->50591 50594 13a44e LoadLibraryW 50593->50594 50594->50590 50608 13ae1c 50595->50608 50598 138ad4 50598->50586 50599 138abe 50610 13bb2c 50599->50610 50602 13bab0 50601->50602 50615 13ba2c 50602->50615 50604 13bad9 50604->50588 50606 137b7b 50605->50606 50607 137b5a NtFreeVirtualMemory 50605->50607 50606->50585 50607->50606 50609 138aaa GetSystemDirectoryW 50608->50609 50609->50598 50609->50599 50613 13ad34 NtAllocateVirtualMemory 50610->50613 50612 13bb54 50612->50598 50614 13ad74 50613->50614 50614->50612 50618 13b058 50615->50618 50617 13ba60 50617->50604 50619 13b087 50618->50619 50620 13b06c 50618->50620 50624 13af9c NtFreeVirtualMemory NtAllocateVirtualMemory VirtualQuery 50619->50624 50621 137b40 NtFreeVirtualMemory 50620->50621 50623 13b079 50621->50623 50623->50617 50624->50623 50637 1389d4 50625->50637 50630 138ae0 50631 13ae1c 50630->50631 50632 138afe GetUserNameA 50631->50632 50633 138b12 wsprintfA 50632->50633 50634 138b2b 50632->50634 50633->50634 50634->50497 50635->50492 50636->50489 50638 1389f2 50637->50638 50639 138a04 FindFirstVolumeW 50638->50639 50640 138a25 GetVolumeInformationW FindVolumeClose 50639->50640 50641 137b89 50639->50641 50640->50641 50642 138bbc 50641->50642 50643 138be5 50642->50643 50652 138d4c 50643->50652 50646 134684 50646->50630 50647 13ad34 NtAllocateVirtualMemory 50648 138c07 50647->50648 50649 138c35 50648->50649 50657 13b984 NtFreeVirtualMemory NtAllocateVirtualMemory VirtualQuery 50648->50657 50651 137b40 NtFreeVirtualMemory 50649->50651 50651->50646 50653 13ad34 NtAllocateVirtualMemory 50652->50653 50654 138d68 50653->50654 50655 138bef 50654->50655 50658 138c4c wsprintfA 50654->50658 50655->50646 50655->50647 50657->50649 50658->50655 50660 1389d4 3 API calls 50659->50660 50661 133276 50660->50661 50692 133194 50661->50692 50663 13328b 50663->50512 50676 136b9c 50663->50676 50664 13327e 50664->50663 50698 1330d0 50664->50698 50667 137b40 NtFreeVirtualMemory 50669 133384 50667->50669 50668 13ba98 3 API calls 50670 133336 50668->50670 50669->50663 50672 137b40 NtFreeVirtualMemory 50669->50672 50671 13335c 50670->50671 50673 13ba98 3 API calls 50670->50673 50671->50667 50672->50663 50674 133349 50673->50674 50674->50671 50675 13ba98 3 API calls 50674->50675 50675->50671 50765 138fe8 50676->50765 50679 13ba98 3 API calls 50680 136bd7 50679->50680 50681 136c12 50680->50681 50682 13ba98 3 API calls 50680->50682 50683 1337c1 50681->50683 50685 137b40 NtFreeVirtualMemory 50681->50685 50684 136bed 50682->50684 50688 1377b0 50683->50688 50684->50681 50686 136bf1 50684->50686 50685->50683 50687 137b40 NtFreeVirtualMemory 50686->50687 50687->50683 50689 1377f1 50688->50689 50690 137803 RtlInitUnicodeString NtCreateFile 50689->50690 50691 1337e5 NtClose 50690->50691 50691->50512 50693 1331d6 50692->50693 50694 133215 wsprintfW 50693->50694 50695 133243 50694->50695 50696 133235 50694->50696 50695->50664 50697 13bb2c NtAllocateVirtualMemory 50696->50697 50697->50695 50699 1389d4 3 API calls 50698->50699 50700 1330f6 50699->50700 50701 133194 2 API calls 50700->50701 50702 1330fe 50701->50702 50703 13310b 50702->50703 50711 137b98 50702->50711 50703->50668 50703->50671 50705 137b40 NtFreeVirtualMemory 50707 13316c 50705->50707 50706 133116 50709 13ba98 3 API calls 50706->50709 50710 13315e 50706->50710 50707->50703 50708 137b40 NtFreeVirtualMemory 50707->50708 50708->50703 50709->50710 50710->50705 50712 137bb5 50711->50712 50718 137bbf 50712->50718 50719 13b154 50712->50719 50714 137e42 50715 13ba98 3 API calls 50714->50715 50714->50718 50716 137e65 50715->50716 50717 137b40 NtFreeVirtualMemory 50716->50717 50716->50718 50717->50718 50718->50706 50728 1388f8 50719->50728 50722 13ba98 3 API calls 50723 13b1a5 50722->50723 50726 13b1bd 50723->50726 50740 13b1d4 50723->50740 50725 137b40 NtFreeVirtualMemory 50727 13b192 50725->50727 50726->50725 50727->50714 50729 13895b 50728->50729 50732 138916 50728->50732 50730 13896a RtlFormatCurrentUserKeyPath 50729->50730 50731 138979 50730->50731 50734 138951 50730->50734 50733 13ba98 3 API calls 50731->50733 50735 13ba98 3 API calls 50732->50735 50733->50734 50736 138955 50734->50736 50737 13ba98 3 API calls 50734->50737 50735->50734 50736->50722 50736->50727 50738 1389af 50737->50738 50738->50736 50739 137b40 NtFreeVirtualMemory 50738->50739 50739->50736 50756 13bf4c 50740->50756 50743 13b20d 50743->50726 50745 13b22c 50745->50743 50746 13b246 NtQueryValueKey 50745->50746 50746->50743 50747 13b27e 50746->50747 50748 13ad34 NtAllocateVirtualMemory 50747->50748 50749 13b289 50748->50749 50750 13b29a NtQueryValueKey 50749->50750 50751 13b32f NtClose 50749->50751 50752 13b2df 50750->50752 50753 13b2cb 50750->50753 50751->50743 50754 137b40 NtFreeVirtualMemory 50752->50754 50755 13ad34 NtAllocateVirtualMemory 50753->50755 50754->50751 50755->50752 50757 13bf66 50756->50757 50759 13b209 50756->50759 50758 13bb2c NtAllocateVirtualMemory 50757->50758 50758->50759 50759->50743 50760 13b0c4 50759->50760 50761 13bf4c NtAllocateVirtualMemory 50760->50761 50762 13b0f1 50761->50762 50763 13b108 NtOpenKey 50762->50763 50764 13b0f5 50762->50764 50763->50764 50764->50745 50766 13bb2c NtAllocateVirtualMemory 50765->50766 50768 139008 50766->50768 50767 136bbb 50767->50679 50767->50683 50768->50767 50769 137b40 NtFreeVirtualMemory 50768->50769 50769->50767 50771 1375ae 50770->50771 50772 1375c0 RtlInitUnicodeString 50771->50772 50811 137414 GetFileAttributesW 50772->50811 50775 13345a 50775->50531 50775->50532 50776 13760e NtCreateFile 50776->50775 50777 137673 NtClose 50776->50777 50777->50775 50778->50539 50780 138ae0 2 API calls 50779->50780 50781 133762 50780->50781 50813 136298 MultiByteToWideChar NtAllocateVirtualMemory 50781->50813 50783 13376a 50814 13b344 50783->50814 50785 13365e 50785->50552 50787 133c42 SetEvent 50786->50787 50788 133c4f 50786->50788 50787->50788 50789 133690 50788->50789 50790 133c59 ReleaseMutex CloseHandle 50788->50790 50791 133a24 50789->50791 50790->50789 50792 133a42 CreateFileW 50791->50792 50793 133695 50791->50793 50792->50793 50794 133a8a 50792->50794 50793->50562 50795 13ad34 NtAllocateVirtualMemory 50794->50795 50796 133af5 50795->50796 50796->50793 50797 133b1b SetFileInformationByHandle 50796->50797 50798 133b67 50797->50798 50799 133b7b 50797->50799 50800 137b40 NtFreeVirtualMemory 50798->50800 50801 137b40 NtFreeVirtualMemory 50799->50801 50800->50793 50802 133b85 CloseHandle CreateFileW 50801->50802 50802->50793 50803 133bd5 50802->50803 50804 133be9 SetFileInformationByHandle 50803->50804 50804->50793 50805 133c14 CloseHandle 50804->50805 50805->50793 50807 13b41a 50806->50807 50808 13b452 CreateProcessW 50807->50808 50809 1336f9 50808->50809 50810 13b4a6 CloseHandle CloseHandle 50808->50810 50809->50573 50810->50809 50812 137439 50811->50812 50812->50775 50812->50776 50813->50783 50819 13c808 CoInitialize CoCreateInstance 50814->50819 50818 13b369 50818->50785 50820 13b35e 50819->50820 50820->50818 50821 13c2c4 50820->50821 50822 13c30c 50821->50822 50824 13c317 50822->50824 50825 13c478 50822->50825 50824->50818 50827 13c4c3 50825->50827 50826 13c4ce 50826->50824 50827->50826 50828 1389d4 3 API calls 50827->50828 50831 13c5c0 50828->50831 50829 13c683 50830 13ad34 NtAllocateVirtualMemory 50829->50830 50837 13c6a2 50830->50837 50831->50829 50832 13ad34 NtAllocateVirtualMemory 50831->50832 50833 13c5ff 50832->50833 50834 13c642 wsprintfW 50833->50834 50835 13c676 50834->50835 50836 137b40 NtFreeVirtualMemory 50835->50836 50836->50829 50838 13c76f wsprintfW 50837->50838 50839 13c7da 50838->50839 50840 137b40 NtFreeVirtualMemory 50839->50840 50840->50826 50841 180078460 50842 180078498 __GSHandlerCheckCommon 50841->50842 50843 1800784c4 50842->50843 50845 180070210 50842->50845 50846 180070227 50845->50846 50846->50846 50847 18007025b VirtualAlloc 50846->50847 50848 180070280 50847->50848 50848->50843 50849 1379c8 50850 1377b0 2 API calls 50849->50850 50851 1379fe 50850->50851 50852 137a02 50851->50852 50857 137768 50851->50857 50865 137704 50857->50865 50860 1378c0 50861 13ad34 NtAllocateVirtualMemory 50860->50861 50862 13793a 50861->50862 50863 137957 NtReadFile 50862->50863 50864 137953 NtClose 50862->50864 50863->50864 50864->50852 50866 137721 50865->50866 50867 137730 NtQueryInformationFile 50866->50867 50868 137757 50867->50868 50868->50852 50868->50860 50869 137acc 50870 1377b0 2 API calls 50869->50870 50871 137b07 50870->50871 50872 137b0b 50871->50872 50875 137a54 NtWriteFile 50871->50875 50876 137abc NtClose 50875->50876 50876->50872

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 0 13463c-1346b9 GetModuleHandleW GetCurrentProcessId call 137b80 call 138ae0 call 13ae78 7 1346bb-1346cb 0->7 8 1346cd-1346d5 0->8 9 1346dd-13470b call 13bc1c call 13cbbc 7->9 8->9 14 134711-13471d 9->14 15 134735-134741 14->15 16 13471f-13472f call 138560 call 138fe0 14->16 18 134743-134749 GetCurrentProcessId 15->18 19 13474f-13475b 15->19 16->15 18->19 20 134b32-134b36 19->20 21 134761-134769 19->21 20->14 25 134b3c-134b44 20->25 23 13476b-134783 call 13841c 21->23 24 13478d-1347ae GetCurrentProcessId OpenProcess 21->24 23->24 39 134785 23->39 24->20 28 1347b4-134815 NtQueryInformationProcess 24->28 29 134b4a-134b82 call 13bc64 call 13bb2c 25->29 30 134c1c-134c21 25->30 35 134b27-134b2c CloseHandle 28->35 36 13481b-134824 28->36 46 134c14 29->46 47 134b88-134b9f call 13ae78 29->47 32 134c23 call 134c38 30->32 33 134c28-134c34 30->33 32->33 35->20 36->35 40 13482a-13487b ReadProcessMemory 36->40 39->24 40->35 42 134881-1348d5 ReadProcessMemory 40->42 42->35 44 1348db-1348e5 42->44 44->35 48 1348eb-134999 call 13ad34 WideCharToMultiByte call 13bfcc * 2 44->48 46->30 53 134bb3-134bbb 47->53 54 134ba1-134bb1 47->54 62 1349f4-1349fa 48->62 63 13499b-1349d2 call 13bfcc 48->63 56 134bc3-134be7 call 13beb0 call 13b900 53->56 54->56 71 134bf3 56->71 72 134be9-134bf1 56->72 66 134a1c-134a53 call 136298 * 2 62->66 67 1349fc-134a17 call 13bfcc 62->67 63->62 74 1349d4-1349ef call 13bfcc 63->74 84 134b04-134b09 66->84 85 134a59 66->85 67->66 76 134bfb-134c12 call 137b40 71->76 72->76 74->62 76->30 87 134b0b-134b13 84->87 88 134b1d-134b22 call 137b40 84->88 86 134a62-134a7e call 13bd7c 85->86 93 134a80-134aaa call 13bc1c call 13ad90 86->93 94 134aac-134ac1 86->94 87->88 90 134b15 87->90 88->35 90->88 93->86 96 134af3-134afd call 136298 94->96 97 134ac3-134af1 call 13bc1c call 136298 94->97 96->84 97->84
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32 ref: 00134666
                                                                                  • GetCurrentProcessId.KERNEL32 ref: 00134673
                                                                                    • Part of subcall function 00138AE0: GetUserNameA.ADVAPI32 ref: 00138B08
                                                                                    • Part of subcall function 00138AE0: wsprintfA.USER32 ref: 00138B25
                                                                                  • GetCurrentProcessId.KERNEL32 ref: 00134743
                                                                                  • GetCurrentProcessId.KERNEL32 ref: 0013478D
                                                                                  • OpenProcess.KERNEL32 ref: 0013479D
                                                                                  • NtQueryInformationProcess.NTDLL ref: 00134800
                                                                                  • ReadProcessMemory.KERNEL32 ref: 00134873
                                                                                  • ReadProcessMemory.KERNEL32 ref: 001348CD
                                                                                    • Part of subcall function 0013AD34: NtAllocateVirtualMemory.NTDLL ref: 0013AD6A
                                                                                  • WideCharToMultiByte.KERNEL32 ref: 00134946
                                                                                  • CloseHandle.KERNEL32 ref: 00134B2C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Process$CurrentMemory$HandleRead$AllocateByteCharCloseInformationModuleMultiNameOpenQueryUserVirtualWidewsprintf
                                                                                  • String ID:
                                                                                  • API String ID: 3997021431-0
                                                                                  • Opcode ID: 4fcbf81e38295e8c30bf4c4e02621455fce0c4a51cb942f1f600040aacfb28cd
                                                                                  • Instruction ID: e82e2dd3dfc7f1b7ce20def0a904a2f795383226c34abd477536f74464ef2488
                                                                                  • Opcode Fuzzy Hash: 4fcbf81e38295e8c30bf4c4e02621455fce0c4a51cb942f1f600040aacfb28cd
                                                                                  • Instruction Fuzzy Hash: 16E13C72209B8486EB60DB25F85439AB3A4F788794F504125EBCD87B68EF7CC585CB40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 180 137588-137605 call 13ae1c * 2 RtlInitUnicodeString call 137414 187 137607-13760c 180->187 188 13760e-137671 NtCreateFile 180->188 189 13768a-137691 187->189 190 137673-137680 NtClose 188->190 191 137686 188->191 190->191 191->189
                                                                                  APIs
                                                                                  • RtlInitUnicodeString.NTDLL ref: 001375E3
                                                                                    • Part of subcall function 00137414: GetFileAttributesW.KERNEL32 ref: 00137428
                                                                                  • NtCreateFile.NTDLL ref: 00137662
                                                                                  • NtClose.NTDLL ref: 00137680
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: File$AttributesCloseCreateInitStringUnicode
                                                                                  • String ID: 0$@
                                                                                  • API String ID: 2504508917-1545510068
                                                                                  • Opcode ID: 76083a2609edba1498485c59019560715fe1d99402632d84a6ddf28b8a5ccd31
                                                                                  • Instruction ID: afb11a08bcd0fe1bedf2a15e3554af01653cd4bd2f33bd9b81831c7dbac689d2
                                                                                  • Opcode Fuzzy Hash: 76083a2609edba1498485c59019560715fe1d99402632d84a6ddf28b8a5ccd31
                                                                                  • Instruction Fuzzy Hash: F921E4B2118B808AE760DF10F46938BB7A0F3C0348F504125E6C987AA9CB7DD949CF40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 253 1377b0-1378a7 call 13ae1c * 2 RtlInitUnicodeString NtCreateFile 258 1378b1-1378bc 253->258 259 1378a9 253->259 259->258
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CreateFileInitStringUnicode
                                                                                  • String ID: 0$@
                                                                                  • API String ID: 2498367268-1545510068
                                                                                  • Opcode ID: 04c235c605806e9dc8f2c28b84d8f7d6f4de585734f90aa2da62749025ce9b27
                                                                                  • Instruction ID: 1947187ad60473b65db10953a17c697283cb76f05eb4de20c211970a26d0b782
                                                                                  • Opcode Fuzzy Hash: 04c235c605806e9dc8f2c28b84d8f7d6f4de585734f90aa2da62749025ce9b27
                                                                                  • Instruction Fuzzy Hash: 4721AF725187C48AE760DF14F45478BBBA4F3C4358F908219E6D987AA8CB7DD589CF40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 265 1368e8-13691f GetAdaptersInfo 266 136921-136941 call 13ad34 GetAdaptersInfo 265->266 267 13696c-136972 265->267 274 136945-136951 266->274 269 136974-136979 call 137b40 267->269 270 13697e 267->270 269->270 271 136983-136987 270->271 275 136953-136955 274->275 276 136957-13696a 274->276 275->271 276->267 276->274
                                                                                  APIs
                                                                                  • GetAdaptersInfo.IPHLPAPI ref: 00136910
                                                                                    • Part of subcall function 0013AD34: NtAllocateVirtualMemory.NTDLL ref: 0013AD6A
                                                                                  • GetAdaptersInfo.IPHLPAPI ref: 0013693B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AdaptersInfo$AllocateMemoryVirtual
                                                                                  • String ID: o
                                                                                  • API String ID: 2718687846-252678980
                                                                                  • Opcode ID: 962fc864ad44ea50d102d36a4ef51c309c81b64051b49607d5a3645f8981529f
                                                                                  • Instruction ID: 2b54693b46fc7e8aed2f6c573157fe1aa3d98f194295aa006c02781794f0a2c3
                                                                                  • Opcode Fuzzy Hash: 962fc864ad44ea50d102d36a4ef51c309c81b64051b49607d5a3645f8981529f
                                                                                  • Instruction Fuzzy Hash: D0018076608B44DADB309B15E49435ABBB0F38C7A8F444625EACD47B68DB7CCA85CF04
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 277 13b0c4-13b0f3 call 13bf4c 280 13b0f5-13b0f7 277->280 281 13b0f9-13b13e call 13ae1c NtOpenKey 277->281 282 13b14d-13b151 280->282 285 13b140 281->285 286 13b148 281->286 285->286 286->282
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Open
                                                                                  • String ID: 0$@
                                                                                  • API String ID: 71445658-1545510068
                                                                                  • Opcode ID: 795e13a4c90058da1f1586ebf72c997efb6f13dca80179e68242aeb83b732573
                                                                                  • Instruction ID: c0161828a460836e3e9f56393cd3b10f8de824402bc5cb210f681390afd7dbd8
                                                                                  • Opcode Fuzzy Hash: 795e13a4c90058da1f1586ebf72c997efb6f13dca80179e68242aeb83b732573
                                                                                  • Instruction Fuzzy Hash: F101BBB221868196D760DF10E89438BBBA4F7D4384F905115E7C996A68EB7CC659CF40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 287 138ae0-138b10 call 13ae1c GetUserNameA 290 138b12-138b25 wsprintfA 287->290 291 138b2b-138b39 287->291 290->291
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: NameUserwsprintf
                                                                                  • String ID: Albus
                                                                                  • API String ID: 54179028-39222308
                                                                                  • Opcode ID: 00ea61a6f36f2d287cf2ddfa281af9f578b78246b28b81e2290f27616a54ea60
                                                                                  • Instruction ID: 20884c27dd7be2d48983651277c0df06c6075eedb352a69f5ef4fab48afbe12a
                                                                                  • Opcode Fuzzy Hash: 00ea61a6f36f2d287cf2ddfa281af9f578b78246b28b81e2290f27616a54ea60
                                                                                  • Instruction Fuzzy Hash: 01F01271624A83D2EB61EF11F8403E96321FB98744FC01031A28D479B8DF7CC65ADB80
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 303 13b1d4-13b20b call 13bf4c 306 13b214-13b22e call 13b0c4 303->306 307 13b20d-13b20f 303->307 311 13b230-13b232 306->311 312 13b237-13b278 call 13ae1c NtQueryValueKey 306->312 308 13b33e-13b342 307->308 311->308 315 13b33a 312->315 316 13b27e-13b294 call 13ad34 312->316 315->308 319 13b29a-13b2c9 NtQueryValueKey 316->319 320 13b32f-13b334 NtClose 316->320 321 13b325-13b32a call 137b40 319->321 322 13b2cb-13b2f6 call 13ad34 319->322 320->315 321->320 322->321 326 13b2f8-13b31d call 13ad90 322->326 326->321
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9a33609b2a6856a8619b29129fe63f4e792fb1ba5e95133a34c5626e82038bfd
                                                                                  • Instruction ID: 64eeb0df88f9820fdf0c27f6f8dada5075d4fbb6a32484c802e4648919d451b0
                                                                                  • Opcode Fuzzy Hash: 9a33609b2a6856a8619b29129fe63f4e792fb1ba5e95133a34c5626e82038bfd
                                                                                  • Instruction Fuzzy Hash: C031E436229A8086DB50DF25E48475EB7A0F7C4B84F905025FB8E87B69EF3CC945CB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 351 13a350-13a36b call 138a94 354 13a374-13a388 call 13ae78 351->354 355 13a36d-13a36f 351->355 359 13a396-13a39b 354->359 360 13a38a-13a394 354->360 356 13a474-13a47b 355->356 361 13a3a0-13a3b1 call 13ba98 359->361 360->361 364 13a3b3-13a3b5 361->364 365 13a3ba-13a3f3 call 13ae1c FindFirstFileW 361->365 364->356 368 13a465-13a46f call 137b40 365->368 369 13a3f5-13a3fa 365->369 368->356 369->368 370 13a3fc-13a411 FindNextFileW 369->370 372 13a413 370->372 373 13a415-13a41b 370->373 372->368 375 13a41f-13a44c call 13bc64 call 136aa4 373->375 376 13a41d 373->376 381 13a463 375->381 382 13a44e-13a461 LoadLibraryW 375->382 376->368 381->369 382->368
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: DirectorySystem
                                                                                  • String ID:
                                                                                  • API String ID: 2188284642-0
                                                                                  • Opcode ID: f5b8e15e2d5f741c678a4cffa39018f89b7dc81c4aebc7bfbd20095086e1a026
                                                                                  • Instruction ID: d8fc94ff480b18e491ad4e5036996112356907c63d80b917440d05f5df75268c
                                                                                  • Opcode Fuzzy Hash: f5b8e15e2d5f741c678a4cffa39018f89b7dc81c4aebc7bfbd20095086e1a026
                                                                                  • Instruction Fuzzy Hash: DC311232218A81D6DB70DB10F48435EB360FBD4364F944726E6EE82AA8EF7CC544CB02
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • NtAllocateVirtualMemory.NTDLL ref: 0013AD6A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AllocateMemoryVirtual
                                                                                  • String ID: @
                                                                                  • API String ID: 2167126740-2766056989
                                                                                  • Opcode ID: 1bc704fd273e58d77e85457f0012f42626ceed0c4d95ff0d4dbaf88ef569351a
                                                                                  • Instruction ID: 1a7158d2f0aef2764b992cc8b4fb6787e02b17bf09df75d1d32465d2ab24561c
                                                                                  • Opcode Fuzzy Hash: 1bc704fd273e58d77e85457f0012f42626ceed0c4d95ff0d4dbaf88ef569351a
                                                                                  • Instruction Fuzzy Hash: BBE0C9B2628B8082D7509F65E45474BB764FB847B4F906305FAA947BD8CBBCC1188F44
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 0013AD34: NtAllocateVirtualMemory.NTDLL ref: 0013AD6A
                                                                                  • NtReadFile.NTDLL ref: 0013799F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AllocateFileMemoryReadVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 1637922817-0
                                                                                  • Opcode ID: 36657efa21e47acabbe304ce370d7eda266725ffc383b0fc2da5649518910504
                                                                                  • Instruction ID: ea394a901197351c597956f6ff9f6741a418d0239023516317dc310e05d47677
                                                                                  • Opcode Fuzzy Hash: 36657efa21e47acabbe304ce370d7eda266725ffc383b0fc2da5649518910504
                                                                                  • Instruction Fuzzy Hash: 7721B776218BC48ADB60CB65E45035AB7A5F3887A4F908525EBCD83B68EF7CC554CF40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CreateFileInitStringUnicode
                                                                                  • String ID:
                                                                                  • API String ID: 2498367268-0
                                                                                  • Opcode ID: b656561e30d1fd1fc609a6f2f889e1297561c276a586ec00a0fee1a63f198b42
                                                                                  • Instruction ID: f5f07010d32f223c71bd71426ba92c3332f9c03d2e5de7a90396874b33ae780b
                                                                                  • Opcode Fuzzy Hash: b656561e30d1fd1fc609a6f2f889e1297561c276a586ec00a0fee1a63f198b42
                                                                                  • Instruction Fuzzy Hash: 3A01AEB220CA80C6CA30DB16E48061EBBB0F799798F540215EA8D97A68DB3DCA458F00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: FileWrite
                                                                                  • String ID:
                                                                                  • API String ID: 3934441357-0
                                                                                  • Opcode ID: 13d6e9b28a46ed7aa7967ced570f62f239b9eb5f972fb27ff2d7d829580b4ea2
                                                                                  • Instruction ID: dc4075ff466b7ce87afa718983a7b976c04739ddca08499728e357f53a0f47da
                                                                                  • Opcode Fuzzy Hash: 13d6e9b28a46ed7aa7967ced570f62f239b9eb5f972fb27ff2d7d829580b4ea2
                                                                                  • Instruction Fuzzy Hash: 69F0E272618B9086D760CB64F48474BB7A0F388394F604129E7C983F68DBBCC1948F40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Close
                                                                                  • String ID:
                                                                                  • API String ID: 3535843008-0
                                                                                  • Opcode ID: d9304d9f457485473b7900aa6a25bb2e7ca8446cd6fe457b90ec29283a0f1812
                                                                                  • Instruction ID: 4bfb8366f596ecfb15ec0b8a40367a621e108a775d381236a3b504595ff154f8
                                                                                  • Opcode Fuzzy Hash: d9304d9f457485473b7900aa6a25bb2e7ca8446cd6fe457b90ec29283a0f1812
                                                                                  • Instruction Fuzzy Hash: BCF01DB222864086D7309B10E44475AB760F7947B8F500314FAAE47AE8DB7DC2448B04
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: FreeMemoryVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 3963845541-0
                                                                                  • Opcode ID: 05855a3fed8d404054af5e3eef5cf0d9a8da3070589f551744240206e39a9f46
                                                                                  • Instruction ID: df0f0e6fbec89c101034d37517d8c71030738eb2d5a587d2c0e381bee24d63b3
                                                                                  • Opcode Fuzzy Hash: 05855a3fed8d404054af5e3eef5cf0d9a8da3070589f551744240206e39a9f46
                                                                                  • Instruction Fuzzy Hash: 95E0B672508A8182D6209B60E44478AB770F3853B8FA44305EAB942AE8CB7CC28ACF00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 107 180070044-1800700c9 108 1800700ce-1800700d1 107->108 109 1800700d5-1800700e0 108->109 109->109 110 1800700e2-1800700e5 109->110 110->108 111 1800700e7-1800700eb 110->111 112 1800701b2 111->112 113 1800700f1-180070102 111->113 115 1800701b6-180070224 call 180070500 * 3 VirtualAlloc 112->115 114 180070105-180070113 113->114 116 180070115-180070120 114->116 117 180070122-180070127 114->117 135 180070227-180070259 115->135 116->116 116->117 119 18007012a-180070135 117->119 119->119 121 180070137-18007013a 119->121 123 18007013c-180070144 121->123 124 18007019b-1800701a1 121->124 127 180070147-180070155 123->127 124->114 126 1800701a7-1800701aa 124->126 126->115 130 180070157-180070162 127->130 131 1800701ac-1800701b0 127->131 130->130 133 180070164-180070167 130->133 131->115 133->131 134 180070169-180070176 133->134 136 180070178 134->136 137 18007017d-180070185 134->137 135->135 138 18007025b-18007027a VirtualAlloc 135->138 136->137 139 180070187 137->139 140 18007018c-180070190 137->140 141 1800704e7-1800704fc 138->141 142 180070280-1800702a2 138->142 139->140 140->124 144 180070192-180070199 140->144 145 1800702a4-1800702aa 142->145 146 1800702c0-1800702e0 142->146 144->127 147 1800702ad-1800702be 145->147 146->141 148 1800702e6-1800702ea 146->148 147->146 147->147
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocVirtual
                                                                                  • String ID: &$58$KYZi$MhGL$k$o0+X$t!
                                                                                  • API String ID: 4275171209-455283310
                                                                                  • Opcode ID: 1d3f5de679e9be7a7fe53fc895b5663e74619cb245d1804fb0228fdac3198365
                                                                                  • Instruction ID: 0e931260a18899616fd0cd13b7456a36469c7a130b0b511a481734c725122d66
                                                                                  • Opcode Fuzzy Hash: 1d3f5de679e9be7a7fe53fc895b5663e74619cb245d1804fb0228fdac3198365
                                                                                  • Instruction Fuzzy Hash: 9E712272701788C6EB6ACF25E044B9E7BB1F348BC8FA59115EE4927B55DA3EC609C700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 149 133a24-133a36 150 133a42-133a7e CreateFileW 149->150 151 133a38-133a3d 149->151 153 133a80-133a85 150->153 154 133a8a-133aa1 call 13ae78 150->154 152 133c21-133c2a 151->152 153->152 157 133aa3-133ab0 154->157 158 133ab2-133aba 154->158 159 133abf-133b00 call 13bc64 call 13ad34 157->159 158->159 164 133b02-133b07 159->164 165 133b0c-133b65 call 131000 SetFileInformationByHandle 159->165 164->152 168 133b67-133b76 call 137b40 165->168 169 133b7b-133bcc call 137b40 CloseHandle CreateFileW 165->169 168->152 174 133bd5-133c0b call 131000 SetFileInformationByHandle 169->174 175 133bce-133bd3 169->175 178 133c14-133c1f CloseHandle 174->178 179 133c0d-133c12 174->179 175->152 178->152 179->152
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CreateFile
                                                                                  • String ID:
                                                                                  • API String ID: 823142352-0
                                                                                  • Opcode ID: 28f683417bb40a7b537b498f59f6f3678ae65d175f6e6e2096980ada4a5882a7
                                                                                  • Instruction ID: dad797483e558c288c3d48e653fba69b019cc3917f1f929bbc32b22e070352a3
                                                                                  • Opcode Fuzzy Hash: 28f683417bb40a7b537b498f59f6f3678ae65d175f6e6e2096980ada4a5882a7
                                                                                  • Instruction Fuzzy Hash: 3151F832208A8082DB60DB69F85035AB760F7C57A4F201225EBED87BE8DF7DC585CB44
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 192 133868-13388f call 13ae1c call 136328 197 133891-133896 192->197 198 13389b-1338a2 call 133074 192->198 199 133a1a-133a21 197->199 202 1338a4-1338a9 198->202 203 1338ae-1338bf call 138560 call 138820 198->203 202->199 208 1338d2-1338da call 138820 203->208 209 1338c1-1338c6 203->209 213 1338ed-13390e GetCurrentProcess IsWow64Process 208->213 214 1338dc-1338e1 208->214 209->208 210 1338c8-1338cd 209->210 210->199 215 133910-133915 213->215 216 13391a-133921 call 1368e8 213->216 214->213 217 1338e3-1338e8 214->217 215->199 220 133923-133928 216->220 221 13392d-133941 call 13ae78 216->221 217->199 220->199 224 133943-13394d 221->224 225 13394f-133954 221->225 226 133959-133977 CreateMutexW 224->226 225->226 227 133979-13398b GetLastError 226->227 228 13398d-13399a 226->228 227->228 229 13399c-1339b3 GetModuleHandleW call 13463c 227->229 228->199 232 1339b5-1339ba 229->232 233 1339bc-1339c3 call 136988 229->233 232->199 236 1339c5-1339ca 233->236 237 1339cc-1339d3 call 136864 233->237 236->199 240 1339d5-1339da 237->240 241 1339dc-1339e8 call 13d134 call 13378c 237->241 240->199 246 1339fb 241->246 247 1339ea-1339f4 call 1333ac 241->247 249 133a05-133a16 call 136250 246->249 250 1339f9 247->250 249->199 250->249
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c40ee5ec7f747c4b479e98bcd982703e9207b45c7ee94fbb0c95756ed98e132e
                                                                                  • Instruction ID: a4d01376934cc61ecc8ebd2fead3eeec67d7e3a7803917deb4e63e550fe7c8c2
                                                                                  • Opcode Fuzzy Hash: c40ee5ec7f747c4b479e98bcd982703e9207b45c7ee94fbb0c95756ed98e132e
                                                                                  • Instruction Fuzzy Hash: F741B331604641C6EB24AF35E80532A7290FB553ACF504325F6BAC76E4DF38CA048B09
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 260 138820-13886a CreateToolhelp32Snapshot call 13ae1c Process32FirstW 263 13888a-1388a0 CloseHandle 260->263 264 13886c-138888 Process32NextW 260->264 264->263 264->264
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                  • String ID:
                                                                                  • API String ID: 420147892-0
                                                                                  • Opcode ID: 2dc8fd6175d5f81b5a57fe4cd961050eae0e2aeff7595481171681c6ca23b914
                                                                                  • Instruction ID: a291f8359edc26666891720508c8b00944b7d82ce8eaebfd2b0a21882595b9ac
                                                                                  • Opcode Fuzzy Hash: 2dc8fd6175d5f81b5a57fe4cd961050eae0e2aeff7595481171681c6ca23b914
                                                                                  • Instruction Fuzzy Hash: EB011936628A40C7E7A0DB11E88875AB760F7C8788F440225FACE87A68DF3CC605CB04
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 292 1800701f0-180070224 VirtualAlloc 294 180070227-180070259 292->294 294->294 295 18007025b-18007027a VirtualAlloc 294->295 296 1800704e7-1800704fc 295->296 297 180070280-1800702a2 295->297 299 1800702a4-1800702aa 297->299 300 1800702c0-1800702e0 297->300 301 1800702ad-1800702be 299->301 300->296 302 1800702e6-1800702ea 300->302 301->300 301->301
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocVirtual
                                                                                  • String ID: &$58
                                                                                  • API String ID: 4275171209-292207594
                                                                                  • Opcode ID: 4f173b11b85c9be10da8eb9948744f72f75bdffef8083b501ef1bcff6fad96bb
                                                                                  • Instruction ID: dc3067c45e012cfe901e309ad5e26282e7953dc62dc132df2a3d5b0976b166a3
                                                                                  • Opcode Fuzzy Hash: 4f173b11b85c9be10da8eb9948744f72f75bdffef8083b501ef1bcff6fad96bb
                                                                                  • Instruction Fuzzy Hash: 6021263371169886CB6ACF74B158BADABA5B748BC8F1590268F4E17F55C93DD10AC700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 329 1800701e0-180070224 VirtualAlloc 331 180070227-180070259 329->331 331->331 332 18007025b-18007027a VirtualAlloc 331->332 333 1800704e7-1800704fc 332->333 334 180070280-1800702a2 332->334 336 1800702a4-1800702aa 334->336 337 1800702c0-1800702e0 334->337 338 1800702ad-1800702be 336->338 337->333 339 1800702e6-1800702ea 337->339 338->337 338->338
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocVirtual
                                                                                  • String ID: &$58
                                                                                  • API String ID: 4275171209-292207594
                                                                                  • Opcode ID: 11a750e4170a9ad4c562e75150ed66c3a2dc3f508a0205cd01daf590c50fbe37
                                                                                  • Instruction ID: 23527d6a8d6615ab95d8207fcdc7229d218c2df4260ae3193873eea517917a3c
                                                                                  • Opcode Fuzzy Hash: 11a750e4170a9ad4c562e75150ed66c3a2dc3f508a0205cd01daf590c50fbe37
                                                                                  • Instruction Fuzzy Hash: 0421233271179486CB6ACF35A158FADABA5B718BC8F169016CF8E17F55C93DD109C300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 340 180070200-180070224 VirtualAlloc 342 180070227-180070259 340->342 342->342 343 18007025b-18007027a VirtualAlloc 342->343 344 1800704e7-1800704fc 343->344 345 180070280-1800702a2 343->345 347 1800702a4-1800702aa 345->347 348 1800702c0-1800702e0 345->348 349 1800702ad-1800702be 347->349 348->344 350 1800702e6-1800702ea 348->350 349->348 349->349
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocVirtual
                                                                                  • String ID: &$58
                                                                                  • API String ID: 4275171209-292207594
                                                                                  • Opcode ID: a6f1ea9488f9dd4da2db5fb67a2fd5314731c71e78e17318f66e63a2c9041829
                                                                                  • Instruction ID: d87006d348cf916555d4c40589e898ccdcab4414593187567b45beb92d847496
                                                                                  • Opcode Fuzzy Hash: a6f1ea9488f9dd4da2db5fb67a2fd5314731c71e78e17318f66e63a2c9041829
                                                                                  • Instruction Fuzzy Hash: 5421333271139886CB6ACF74A158FADABA1B708BC4F169115CE8E17F06C93DD109C300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$CreateProcess
                                                                                  • String ID:
                                                                                  • API String ID: 2922976086-0
                                                                                  • Opcode ID: cd309ebfe44d1ce1b9eebeab880966758d8a8f2593ff83e7c251b015e6764e6d
                                                                                  • Instruction ID: fd3ac5a0e7075c15fb836cc18ce1d716d5c8f610cdcfbdc2cbe9824124749b6e
                                                                                  • Opcode Fuzzy Hash: cd309ebfe44d1ce1b9eebeab880966758d8a8f2593ff83e7c251b015e6764e6d
                                                                                  • Instruction Fuzzy Hash: 2C110336618A8087E760CF24F48475BB7A0F7C8354F508526EBCA82E68EBBCC448CF04
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • FindFirstVolumeW.KERNEL32 ref: 00138A0E
                                                                                  • GetVolumeInformationW.KERNEL32 ref: 00138A62
                                                                                  • FindVolumeClose.KERNEL32 ref: 00138A71
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Volume$Find$CloseFirstInformation
                                                                                  • String ID:
                                                                                  • API String ID: 586543143-0
                                                                                  • Opcode ID: f8471610ee8cd183a9485870a89c6ee0d7cca4bc8c0aade8722fc7fa7e06f6f6
                                                                                  • Instruction ID: d52d27266562d71768750e1cd53a8f5ea0733f61fd9197e1eb945d7e96be4b47
                                                                                  • Opcode Fuzzy Hash: f8471610ee8cd183a9485870a89c6ee0d7cca4bc8c0aade8722fc7fa7e06f6f6
                                                                                  • Instruction Fuzzy Hash: 1111EC32228B40D6D761DB11F48439AB7B0F7C4360FA44226E79983AA8DF7CC949CB40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseEventHandleMutexRelease
                                                                                  • String ID:
                                                                                  • API String ID: 3391745777-0
                                                                                  • Opcode ID: 34ec866cfd7482a0b3d3af7380d3e699ee32a18233fddf405b1384eaf4aff779
                                                                                  • Instruction ID: 3eca42532b44088a47f1e911d2d46e0828c3e55978b3a04d8f9b607d950eae06
                                                                                  • Opcode Fuzzy Hash: 34ec866cfd7482a0b3d3af7380d3e699ee32a18233fddf405b1384eaf4aff779
                                                                                  • Instruction Fuzzy Hash: BCE09234508A40C2E7A29B1AEC4839423B0F788B58F480215DF4E52270CF7CC989CB18
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CreateInitializeInstance
                                                                                  • String ID:
                                                                                  • API String ID: 3519745914-0
                                                                                  • Opcode ID: 5f95cf64fe2eaace5818cad7947abaf6b2442e6c64c43a74d831eec03a8d12d4
                                                                                  • Instruction ID: 8548fcd2aeb7b2cc2e051ad8c909e34451fff1d6c8d8d5849f97d72f9d8d24c7
                                                                                  • Opcode Fuzzy Hash: 5f95cf64fe2eaace5818cad7947abaf6b2442e6c64c43a74d831eec03a8d12d4
                                                                                  • Instruction Fuzzy Hash: 3D41AA36218BC8C6DBA0CB15E49479EB761F3D8B94F408126EACE53B68DF79C585CB40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocVirtual
                                                                                  • String ID: &$58
                                                                                  • API String ID: 4275171209-292207594
                                                                                  • Opcode ID: b6a3a98d28c9259cb78a12b48d44ca555a7ad990dfd794d5708a1868dd1c73ff
                                                                                  • Instruction ID: cbf57c0b74e788f2119e0e4766543ca7679dc5ca0df739001d034443fdc2105d
                                                                                  • Opcode Fuzzy Hash: b6a3a98d28c9259cb78a12b48d44ca555a7ad990dfd794d5708a1868dd1c73ff
                                                                                  • Instruction Fuzzy Hash: 4021F07231139886CA69CF75A248FA9ABA5B708BC4F1691158F8E27F45CA3DE10AC700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • RtlFormatCurrentUserKeyPath.NTDLL ref: 0013896F
                                                                                    • Part of subcall function 00137B40: NtFreeVirtualMemory.NTDLL ref: 00137B71
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CurrentFormatFreeMemoryPathUserVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 2593304397-0
                                                                                  • Opcode ID: f52ee2aa33d777d70af5112c0a56f381be43764fb5e061da45e694194d02d43a
                                                                                  • Instruction ID: fd0ab2d50d9f534c7aa929576f7234e37cfb853012afa37e83e27fdb4509fd98
                                                                                  • Opcode Fuzzy Hash: f52ee2aa33d777d70af5112c0a56f381be43764fb5e061da45e694194d02d43a
                                                                                  • Instruction Fuzzy Hash: 9011DA32218B8691DB20DB21E89136AB374F7E838CF905525F7CE82668EF3DC605CB01
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • GetFileAttributesW.KERNEL32 ref: 00137428
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AttributesFile
                                                                                  • String ID:
                                                                                  • API String ID: 3188754299-0
                                                                                  • Opcode ID: 252c82bd18f63079363c04d0726cb3e85d9e951d6d0439d97e6f477b3e596fc1
                                                                                  • Instruction ID: a1a9130c9b2843c74e60f2d92ae78b3f22b94104eba2f3eb9f5da2fdd0014926
                                                                                  • Opcode Fuzzy Hash: 252c82bd18f63079363c04d0726cb3e85d9e951d6d0439d97e6f477b3e596fc1
                                                                                  • Instruction Fuzzy Hash: D4E04FB2A3C681C6D7B09B34E84576A6A60F385350F501620AAE7815D4DB38D459DF01
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Filememmove$CloseHandlememset$Local$CreateCurrentDescriptorFreeMappingProcessSecurityViewWindow$AllocAppendCountDaclExecuteFindForegroundInitializeModuleNameObjectPathShellSingleSizeSleepThreadTickUnmapWaitrandsrandwsprintf
                                                                                  • String ID: %u_%d_%d_%d_%u$..\360DeskAna64.exe$/%s %s %u$Progman$Program manager$open$se1$se2
                                                                                  • API String ID: 1121195023-828389715
                                                                                  • Opcode ID: bf27cba7947237ddb48d80a7ebe4eca32a8cf6ef406abc02a9deeb192b889f14
                                                                                  • Instruction ID: 9c018b3ec5208d5dc303fe800ce77a7618bf785d2afa65f14d01c037d361c4e0
                                                                                  • Opcode Fuzzy Hash: bf27cba7947237ddb48d80a7ebe4eca32a8cf6ef406abc02a9deeb192b889f14
                                                                                  • Instruction Fuzzy Hash: D332CC72604B8886FB96CF25D8803DD73B1F789BD8F528116EA5947BA4DF38C649C708
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$FilePath$Exists$BackslashCloseModuleNameOpenQueryValue
                                                                                  • String ID: %s\%s$360SkinMgr.exe$360leakfixer.exe$Path$SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\App Paths\360safe.exe$SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\App Paths\360sd.exe$hipsver.dll$safemon\360Cactus.tpi$safemon\FreeSaaS.tpi$safemon\pedrver.dll
                                                                                  • API String ID: 4260417939-4002867936
                                                                                  • Opcode ID: 69930986b2b6c6c437e187827024c0865ac4d7e0e25485b3d46344904dffa666
                                                                                  • Instruction ID: bf4960b57fd98bc25e9fd953caee1d48b1d668c6bea79cfa729634ea3028d897
                                                                                  • Opcode Fuzzy Hash: 69930986b2b6c6c437e187827024c0865ac4d7e0e25485b3d46344904dffa666
                                                                                  • Instruction Fuzzy Hash: BCB13D31614E8895EBA2DB21EC543DA63A4F78DBC4F908116FA9D87A95EF39C70DC700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Read$Pointer$CloseHandlememmove$??3@$ByteCharCreateMultiSizeWide_wcslwrwcschr
                                                                                  • String ID: 9
                                                                                  • API String ID: 2469906296-2366072709
                                                                                  • Opcode ID: 1edc00ec3368a205bebbe676ef1486fb611a75b6483dacecd85243c6051295a2
                                                                                  • Instruction ID: b16b18eef39a39b515becb99aaa5640e1c6952976385d86e077c0efac659451c
                                                                                  • Opcode Fuzzy Hash: 1edc00ec3368a205bebbe676ef1486fb611a75b6483dacecd85243c6051295a2
                                                                                  • Instruction Fuzzy Hash: 43D1D072300A8886EBA6DF25E8507ED37A1F749BD8F448614FE5647BA8DF38C249C700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$Modulememset$CombineFileFreeHandleLibraryNamePath
                                                                                  • String ID: ..\ipc\x64for32lib.dll$EnumProcessModules64$GetCommandLine64$GetCurrentDirectory64$GetModuleBaseNameW64$GetModuleFileNameExW64$GetModuleInformation64$IsProcessWow64Process$NtQueryInformationProcess64$NtQueryInformationThread64$ReadProcessMemory64
                                                                                  • API String ID: 3359005274-2277939915
                                                                                  • Opcode ID: 11406f1aeae7bd1ca1e9419c163a9dd1d65d254f22157801c59e7a4b8def0cf2
                                                                                  • Instruction ID: 36480451210aca2b5e6fe81c352119384c097133635e903ecd0715684d47c6ca
                                                                                  • Opcode Fuzzy Hash: 11406f1aeae7bd1ca1e9419c163a9dd1d65d254f22157801c59e7a4b8def0cf2
                                                                                  • Instruction Fuzzy Hash: 2D512532201F5AA2EEA58F51E99439833A5FB4C7C0F549525EA5907A60DF38D3B9C710
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$Close$Open$Enumfree
                                                                                  • String ID: HKEY_LOCAL_MACHINE\$\Components\$\Features\$\Products\
                                                                                  • API String ID: 1285027818-2258373985
                                                                                  • Opcode ID: 9906bf7cd91924df8938282da413fefd9331e0d97fbadb0acae730663cf89f7c
                                                                                  • Instruction ID: 6311c4a4e92b2eb2b6e61e2371f742115398930d0f6aaa53fdf69de799299566
                                                                                  • Opcode Fuzzy Hash: 9906bf7cd91924df8938282da413fefd9331e0d97fbadb0acae730663cf89f7c
                                                                                  • Instruction Fuzzy Hash: 9C126F72218AC891FAB2EB55E8453DAB365FB897C4F448111FA8E43A99DF3DC749C700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • CreatePipe.KERNEL32 ref: 001310FF
                                                                                  • SetHandleInformation.KERNEL32 ref: 00131119
                                                                                  • CreatePipe.KERNEL32 ref: 0013113A
                                                                                  • SetHandleInformation.KERNEL32 ref: 00131154
                                                                                  • CreatePipe.KERNEL32 ref: 00131175
                                                                                  • SetHandleInformation.KERNEL32 ref: 0013118F
                                                                                  • CreateProcessW.KERNEL32 ref: 00131251
                                                                                    • Part of subcall function 0013AD34: NtAllocateVirtualMemory.NTDLL ref: 0013AD6A
                                                                                  • PeekNamedPipe.KERNEL32 ref: 00131300
                                                                                  • ReadFile.KERNEL32 ref: 0013135C
                                                                                  • PeekNamedPipe.KERNEL32 ref: 001313B0
                                                                                  • ReadFile.KERNEL32 ref: 0013140C
                                                                                  • GetExitCodeProcess.KERNEL32 ref: 00131445
                                                                                  • TerminateProcess.KERNEL32 ref: 00131476
                                                                                  • CloseHandle.KERNEL32 ref: 00131484
                                                                                    • Part of subcall function 0013CB54: NtDelayExecution.NTDLL ref: 0013CB76
                                                                                  • CloseHandle.KERNEL32 ref: 00131492
                                                                                  • CloseHandle.KERNEL32 ref: 001314A0
                                                                                  • CloseHandle.KERNEL32 ref: 001314AE
                                                                                    • Part of subcall function 00137B40: NtFreeVirtualMemory.NTDLL ref: 00137B71
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Handle$Pipe$CloseCreate$InformationProcess$FileMemoryNamedPeekReadVirtual$AllocateCodeDelayExecutionExitFreeTerminate
                                                                                  • String ID: h
                                                                                  • API String ID: 30365702-2439710439
                                                                                  • Opcode ID: eb7bea1748a89db5f07d023bcdb676065683870e413be2d4ad1df109deaa66ff
                                                                                  • Instruction ID: 7eea54fee0b2fed40058bfb68b1866b961760aac0ca0060e7c8b8bd834170f5c
                                                                                  • Opcode Fuzzy Hash: eb7bea1748a89db5f07d023bcdb676065683870e413be2d4ad1df109deaa66ff
                                                                                  • Instruction Fuzzy Hash: 34C1AF36208BC09AE760DB65E49479AB7A1F7C8754F504125EAC987A68DFBDC488CF40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Windowmemset$MessageQuerySendTimeoutValue$CloseFindForegroundOpenmemmove
                                                                                  • String ID: MsgCenter$Q360SafeMonClass$TS2P$activeapp$activeweb
                                                                                  • API String ID: 3772276521-2728888700
                                                                                  • Opcode ID: 252ce8677bfb522a4b6632ad157aa9371a8792e99c65b85e20036a72b1270932
                                                                                  • Instruction ID: ee8cae4e48a5beadbc07239537d79e19b069e47090ef93ff609d4821bf219365
                                                                                  • Opcode Fuzzy Hash: 252ce8677bfb522a4b6632ad157aa9371a8792e99c65b85e20036a72b1270932
                                                                                  • Instruction Fuzzy Hash: C1D19172604B4886EB51DF25E8403DE7761F789BE8F608215EAAD43BE5DF38C649CB40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: free$calloc$memset
                                                                                  • String ID: -$]$]
                                                                                  • API String ID: 2591755499-1349866957
                                                                                  • Opcode ID: 2679cd0fb79ab9e79cb7ec4cb87940f65e1566cfba3dc15da5d319deb0b258b9
                                                                                  • Instruction ID: 1d85a50f400dc416e5d0a718f77556582d5ce19bdf984b68484f18af02043cc0
                                                                                  • Opcode Fuzzy Hash: 2679cd0fb79ab9e79cb7ec4cb87940f65e1566cfba3dc15da5d319deb0b258b9
                                                                                  • Instruction Fuzzy Hash: BCA1D272706BC892EB96CB16D0403A977A1F74D780F449616EB8A17B81DF39D2B9D300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Timefree$??3@System$FileMutexRelease
                                                                                  • String ID: AND $ SLEV = %d $ TYPE = %d$ WHERE $DELETE FROM 'MT' $INSERT INTO "MT" VALUES ( ?,?,?,?,?,?,?,?,?,?,?,?,NULL ) $ModName LIKE '$TimeStamp < %I64d;
                                                                                  • API String ID: 2360919559-3261407791
                                                                                  • Opcode ID: 0fdc13341be9cf7c256e26cb2936a3b5a8a79f5d9c0121a176094682301e8f56
                                                                                  • Instruction ID: fbbc87ecfbf22c2b8803d4662eccf4799cfebf60f86054df91e993a66dbd8da4
                                                                                  • Opcode Fuzzy Hash: 0fdc13341be9cf7c256e26cb2936a3b5a8a79f5d9c0121a176094682301e8f56
                                                                                  • Instruction Fuzzy Hash: B102B332711A4C85FFB29BA5D4403DD2361AB887D8F148627BE2E6B7D4DE3AC649C300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$CloseDeleteEnterLeaveOpenmemset
                                                                                  • String ID: %s\%s$Catalog_Entries$Catalog_Entries64$NameSpace_Catalog5$Num_Catalog_Entries$Num_Catalog_Entries64$SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\NameSpace_Catalog5\%s$SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\NameSpace_Catalog5\%s\%012d
                                                                                  • API String ID: 2413450229-732542554
                                                                                  • Opcode ID: 5d3b3c8892c10d7fff7567f6933cd8fc0a8177a7f871dcf3f8d0113f8f36deb6
                                                                                  • Instruction ID: 3ab1713314ff84c9548747a70e29f101a91a5434d94fe8d6158548384223fcd6
                                                                                  • Opcode Fuzzy Hash: 5d3b3c8892c10d7fff7567f6933cd8fc0a8177a7f871dcf3f8d0113f8f36deb6
                                                                                  • Instruction Fuzzy Hash: 69C1DEB1701A4D82EEA6DB29E8457D963A0F788BD4F04C422FE0D1B7A5DF39C64AC700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CharNext$lstrcmpi$Value
                                                                                  • String ID:
                                                                                  • API String ID: 3520330261-0
                                                                                  • Opcode ID: e6b0475dc37a1ccc9b5f93fb3a52cf7f5178555000e54cf4b197682acd1df91f
                                                                                  • Instruction ID: 54a0f5542f62afcd6411b2081a4c08be2fbbe8d603b0a409542dd15f8ed12d0a
                                                                                  • Opcode Fuzzy Hash: e6b0475dc37a1ccc9b5f93fb3a52cf7f5178555000e54cf4b197682acd1df91f
                                                                                  • Instruction Fuzzy Hash: D3D1643260864982FBA2DB15E8543DA76E1FB9C7D0F91C121BA99476E4EF38C74DD700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wtoi$Value$??3@memset
                                                                                  • String ID: %d|%d|%d|%d$MontiorInfo$MsgCenter
                                                                                  • API String ID: 1219333133-3184008533
                                                                                  • Opcode ID: 5a13214d90345a148425d7b4cec5787b2bbb9191422684e28f36f8c5be619ee2
                                                                                  • Instruction ID: 3a97e8b4d36ab7b0ff62b7c8c746816c118d75ce1dcaba847e92933311b9e76e
                                                                                  • Opcode Fuzzy Hash: 5a13214d90345a148425d7b4cec5787b2bbb9191422684e28f36f8c5be619ee2
                                                                                  • Instruction Fuzzy Hash: FDC1B472604B4887EB51CF29E84039E77A1F789BA4F208216FAAD577A4DF78D644CB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 0013AD34: NtAllocateVirtualMemory.NTDLL ref: 0013AD6A
                                                                                  • GetAdaptersInfo.IPHLPAPI ref: 00137FF4
                                                                                  • GetAdaptersInfo.IPHLPAPI ref: 0013802B
                                                                                  • wsprintfA.USER32 ref: 00138074
                                                                                  • wsprintfA.USER32 ref: 0013815F
                                                                                  • wsprintfA.USER32 ref: 001381C3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: wsprintf$AdaptersInfo$AllocateMemoryVirtual
                                                                                  • String ID: o
                                                                                  • API String ID: 2074107575-252678980
                                                                                  • Opcode ID: 78c1bf18890002bbd55230ae8bdd6788f42dae7e011ee9be3a01caf660352b1c
                                                                                  • Instruction ID: 73acef771514c589cdb48e56c6d8ad713546e67bef7c99e3ad8be745b83c9193
                                                                                  • Opcode Fuzzy Hash: 78c1bf18890002bbd55230ae8bdd6788f42dae7e011ee9be3a01caf660352b1c
                                                                                  • Instruction Fuzzy Hash: ACA1B876209B848ADB64CB15F49039AB7A0F788788F50052AFBCE83B69DF7CC555CB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??3@CriticalSectionString$??2@AllocAttributesEnterFileFreeLeavememmove
                                                                                  • String ID: 360util
                                                                                  • API String ID: 2488163691-2294763832
                                                                                  • Opcode ID: ba9b85f3e8219bbad665a1013a4ecfff85fbfd5e77b065d066760422abbecf22
                                                                                  • Instruction ID: 9938724ed40c23cc8900e9648d175c046ed33f6fe674e618e7d9782a5817fc1c
                                                                                  • Opcode Fuzzy Hash: ba9b85f3e8219bbad665a1013a4ecfff85fbfd5e77b065d066760422abbecf22
                                                                                  • Instruction Fuzzy Hash: AE029C73B01B488AEB91CB64D8443DD33A6FB48798F519226EE592BB94DF38C619C344
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterPresentProcessUnhandled$CaptureContextCurrentDebuggerEntryFeatureFunctionLookupProcessorTerminateUnwindVirtualmemset
                                                                                  • String ID:
                                                                                  • API String ID: 2775880128-0
                                                                                  • Opcode ID: 720e268603e6e9f10860910523c2ba7112bd240762bfe9a634b271c2e63346d6
                                                                                  • Instruction ID: 97518c6b28749f0b1885d3d6b1dd33bd68934808d59c248e1302251445d11ba7
                                                                                  • Opcode Fuzzy Hash: 720e268603e6e9f10860910523c2ba7112bd240762bfe9a634b271c2e63346d6
                                                                                  • Instruction Fuzzy Hash: 1E413032A14B858AE751CF60EC503ED7360F799788F119229EA9D46B69EF78C398C700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CloseCurrentErrorHandleLastOpenToken$AdjustLookupPrivilegePrivilegesValue
                                                                                  • String ID:
                                                                                  • API String ID: 2007143780-0
                                                                                  • Opcode ID: 6a90cf9bb053f436ae0415ad8c3242d222e7ab952c09d034660e141397cb4a9e
                                                                                  • Instruction ID: d46f0c18e1a39d64aeb05f722a7361000aff992e322ccff9c5dcc36b437ee35a
                                                                                  • Opcode Fuzzy Hash: 6a90cf9bb053f436ae0415ad8c3242d222e7ab952c09d034660e141397cb4a9e
                                                                                  • Instruction Fuzzy Hash: 2E218032604B4982EB919F61E8583DA63A1FB8CBD5F458035FA9E47B64DF3CC6498B04
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$??3@CountEnterLeaveTickmemmove
                                                                                  • String ID:
                                                                                  • API String ID: 1944083165-0
                                                                                  • Opcode ID: e7dc1351d672686ce6982c514aa1efe126a088afe47b95bc729bfb6aef2c92dc
                                                                                  • Instruction ID: f41da155b52ef09f3583e4d9bfd8bf17b476c2db053c24b9ffbabfba65fc2eed
                                                                                  • Opcode Fuzzy Hash: e7dc1351d672686ce6982c514aa1efe126a088afe47b95bc729bfb6aef2c92dc
                                                                                  • Instruction Fuzzy Hash: 37E15932B01F449AEB92CFA1E8403DD33B6F748798F148125EE5967B98DE34C65AD344
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: _swprintf_c_l$ErrorFileLastSizemallocmemset
                                                                                  • String ID: INIT
                                                                                  • API String ID: 2772675779-4041279936
                                                                                  • Opcode ID: 91801e61f8e34b5680577b6ef1157ad949fcf405e34d1d65f93b8e184a0d9fad
                                                                                  • Instruction ID: 738f7e56dffb12879fa424a41098a8b7db62e01a67729e30f645ff56db629163
                                                                                  • Opcode Fuzzy Hash: 91801e61f8e34b5680577b6ef1157ad949fcf405e34d1d65f93b8e184a0d9fad
                                                                                  • Instruction Fuzzy Hash: 31E192727043588BF7A6EB6598507EA77A6F70D7C8F54C029AE5A43B86DF34C608CB10
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpenQueryValuememmove
                                                                                  • String ID: 360scan
                                                                                  • API String ID: 1121107697-2450673717
                                                                                  • Opcode ID: 220e67dd3970d468599f7a797be11ec42a8334a823f280886d40bb2abff1120a
                                                                                  • Instruction ID: 8412be06b917c2556790a81d519247f335b1f81f587c3bd72331bc97ccab05af
                                                                                  • Opcode Fuzzy Hash: 220e67dd3970d468599f7a797be11ec42a8334a823f280886d40bb2abff1120a
                                                                                  • Instruction Fuzzy Hash: B551F336700A4889FBA6CBB5E8107ED3760BB487E8F548215EEA917B95DF74C649C700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionThrow$??3@
                                                                                  • String ID:
                                                                                  • API String ID: 3542664073-0
                                                                                  • Opcode ID: 4077b6000bdbe81cdcb22badff92ad6060c6f4ec82431c923b1cffb770fd83d1
                                                                                  • Instruction ID: f77bb453ddad34bb426a0367fc3509630a9405fc871705a0e6efaa82900c553f
                                                                                  • Opcode Fuzzy Hash: 4077b6000bdbe81cdcb22badff92ad6060c6f4ec82431c923b1cffb770fd83d1
                                                                                  • Instruction Fuzzy Hash: 35216A72B00A88C9E75DFE33B8423EB6212ABD87C0F18D435BA594B69BDE25C5168740
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseFileInitOpenStringUnicode
                                                                                  • String ID: $0$@
                                                                                  • API String ID: 3719522541-2347541974
                                                                                  • Opcode ID: 569bf1d9c0e4b42045824f196861e1bccdac350dc9b2e721c941129060653f3b
                                                                                  • Instruction ID: 3ce89dd518e80b804148b30e01c1c79a3aa1cd66aa210b17866225896c3f9342
                                                                                  • Opcode Fuzzy Hash: 569bf1d9c0e4b42045824f196861e1bccdac350dc9b2e721c941129060653f3b
                                                                                  • Instruction Fuzzy Hash: 9001DA72119B8096E750DF10E49439BBB60F3D4794FA01025E7CA83AB8DB7DD98ACF41
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0000000180066CBF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: DebugDebuggerErrorLastOutputPresentStringmemset
                                                                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                  • API String ID: 1848478996-631824599
                                                                                  • Opcode ID: 9f3b69b346ce0167d1f9eabdb45a87455ea8902d3636c2fa194e63da2080b7c6
                                                                                  • Instruction ID: 5420fd47393a03a9017ccb442b178d5ad27f9d1acba3036b184651f5d30fce96
                                                                                  • Opcode Fuzzy Hash: 9f3b69b346ce0167d1f9eabdb45a87455ea8902d3636c2fa194e63da2080b7c6
                                                                                  • Instruction Fuzzy Hash: FC117032710B4997F7869B22EE453E932A1FB58395F50C125E75982AA0EF3CD67CC710
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionThrow
                                                                                  • String ID:
                                                                                  • API String ID: 432778473-0
                                                                                  • Opcode ID: 51705d7ffc1c5a9faf17d18654f459016f05baa871bea5d42b40ed88e15a0c9d
                                                                                  • Instruction ID: 0cc55a271704fcaf4879220f63c9cc24c35a4ef39e1216f676686ee34d186413
                                                                                  • Opcode Fuzzy Hash: 51705d7ffc1c5a9faf17d18654f459016f05baa871bea5d42b40ed88e15a0c9d
                                                                                  • Instruction Fuzzy Hash: CE118471714A88C9E75EFE33A8027EB5312ABDC7C0F14D434B9894B65BCF25C6164300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: DeleteFileInitStringUnicode
                                                                                  • String ID: 0$@
                                                                                  • API String ID: 3559453722-1545510068
                                                                                  • Opcode ID: b6164af5c4588a1862d81e9109c65e2a6067d28343454251f55d6c9ee728859c
                                                                                  • Instruction ID: 2211810f5e9bca1ce03e373e1f37dcadc778416c3091536c55e258067f89eb4a
                                                                                  • Opcode Fuzzy Hash: b6164af5c4588a1862d81e9109c65e2a6067d28343454251f55d6c9ee728859c
                                                                                  • Instruction Fuzzy Hash: 7AF0B2B2218A8186D7209F14E49438BBBA4F794798FA04115E6CE47A68DB7DC659CF40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 0013AD34: NtAllocateVirtualMemory.NTDLL ref: 0013AD6A
                                                                                  • FindFirstFileA.KERNEL32 ref: 00131AC7
                                                                                  • wsprintfA.USER32 ref: 00131B95
                                                                                  • FindNextFileA.KERNEL32 ref: 00131BC2
                                                                                  • FindClose.KERNEL32 ref: 00131BD5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Find$File$AllocateCloseFirstMemoryNextVirtualwsprintf
                                                                                  • String ID:
                                                                                  • API String ID: 65906682-0
                                                                                  • Opcode ID: 7544d8a013f7abd9b84a5d7f403609ff286104f35a45eb63b3216f6701f46496
                                                                                  • Instruction ID: b9ef09451730d036464fe2c08f4bec31ddadfe8e21a1d15780dc9294e65cae9c
                                                                                  • Opcode Fuzzy Hash: 7544d8a013f7abd9b84a5d7f403609ff286104f35a45eb63b3216f6701f46496
                                                                                  • Instruction Fuzzy Hash: 60510A72219BC5E2DB20DB01F49039AB775FBD4394F905526E68E43AA8EF7CC649CB40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: memmovememset
                                                                                  • String ID:
                                                                                  • API String ID: 1288253900-0
                                                                                  • Opcode ID: 25317eca67bb0a3083e8d95f7975eeecdd6a0a887f58df33bf998c20beef77dc
                                                                                  • Instruction ID: 53b279b989bf8eb66429a88fea8492b1387e1814281b1786c9cbc4725fb6e079
                                                                                  • Opcode Fuzzy Hash: 25317eca67bb0a3083e8d95f7975eeecdd6a0a887f58df33bf998c20beef77dc
                                                                                  • Instruction Fuzzy Hash: 56A1A273A146D48FD795CF79D8407AC7BE1F389788F548126EA9997B48EB38C205CB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Version
                                                                                  • String ID:
                                                                                  • API String ID: 1889659487-0
                                                                                  • Opcode ID: 1c33a9e7f7864ab9b6d588ba9abe1a45e84af9b554b73114541b1a6212808f0c
                                                                                  • Instruction ID: f354f61e78200fe81e0a43f71fd85efff351c5663b18922339b649b43e4b5968
                                                                                  • Opcode Fuzzy Hash: 1c33a9e7f7864ab9b6d588ba9abe1a45e84af9b554b73114541b1a6212808f0c
                                                                                  • Instruction Fuzzy Hash: A03190F2829780CADB748B40E48936AB6A0F395759F55211AF28B45958CB7CC9D8CF06
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: FileInternetRead
                                                                                  • String ID:
                                                                                  • API String ID: 778332206-0
                                                                                  • Opcode ID: e7fe929742e2ac5551c0b5bf5975d3ec219019460fbf9948bd6d2171cb39b706
                                                                                  • Instruction ID: ca49efcef7773ba6ed6b433f458e6264f7c41a93bbacd6fd75cd574bca563f9a
                                                                                  • Opcode Fuzzy Hash: e7fe929742e2ac5551c0b5bf5975d3ec219019460fbf9948bd6d2171cb39b706
                                                                                  • Instruction Fuzzy Hash: 3511F93232868597DB65CA15E4547AAA3E6F7C8B84F804125AA8D83B58EF7DC645CF00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ControlDevice
                                                                                  • String ID:
                                                                                  • API String ID: 2352790924-0
                                                                                  • Opcode ID: a66e1d163aca22c0d64387c7a093102cf96f82ef91a8c2df69456084ab1fc6cd
                                                                                  • Instruction ID: 1e54cb40d621f6ee58c2f67f74a10768d1db0efbd2ae079103c51a30650bf8b3
                                                                                  • Opcode Fuzzy Hash: a66e1d163aca22c0d64387c7a093102cf96f82ef91a8c2df69456084ab1fc6cd
                                                                                  • Instruction Fuzzy Hash: 68D04276928B84CBD6A09B18F48430AB7A0F388794F501215EBCD46B29DB3CC2558F04
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a7e8b3a06e032308635d2037ffc9f4553eadc341b1c96db30923b3bf8c960e7f
                                                                                  • Instruction ID: 52d7be0db948e51a3071de6eae9a16f3fecf3e0a6d54012035996ad6ac793130
                                                                                  • Opcode Fuzzy Hash: a7e8b3a06e032308635d2037ffc9f4553eadc341b1c96db30923b3bf8c960e7f
                                                                                  • Instruction Fuzzy Hash: 0D011F8790E3D45BC3078B750CA205E3F709693A4438BC1ABC399C3283D60D5919D722
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6a035545d14f4d889ab215aa68e43aeeb25967380c8536a5bebcf1304ebbf42d
                                                                                  • Instruction ID: 635a34729624dbe067341029a1c4ed0c67fb7a74477a886226d8198c4ed4d1d2
                                                                                  • Opcode Fuzzy Hash: 6a035545d14f4d889ab215aa68e43aeeb25967380c8536a5bebcf1304ebbf42d
                                                                                  • Instruction Fuzzy Hash: AFF0318B90E3D46BC3030F340CA219C3F700293A44B9AD0A3C7A8E3783D40E695AE762
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8246972d00f7b6f65566328481c67de661093764b5a2be5aac936da48b2a51d6
                                                                                  • Instruction ID: c272f3b44f45aa2f0b8d17d573eb5996cfb31920d0d8bc550c0fd2c8bdb0490a
                                                                                  • Opcode Fuzzy Hash: 8246972d00f7b6f65566328481c67de661093764b5a2be5aac936da48b2a51d6
                                                                                  • Instruction Fuzzy Hash: 4EF00B8B90E3E4ABC7030E340CA209D3FB04693A4439AD1A7C3A5E3783950E581AE723
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 58575a1358ae7e387839bc9df08da724cb04d05ef8efba8a2ce89fd355e24106
                                                                                  • Instruction ID: 6bbf2164b3f308e0ad865be7b43a87ef8cc59ea827d5f1cea88a1b47ec1c57d9
                                                                                  • Opcode Fuzzy Hash: 58575a1358ae7e387839bc9df08da724cb04d05ef8efba8a2ce89fd355e24106
                                                                                  • Instruction Fuzzy Hash: 9BF05AA790E7C0ABD3175F3448A424D3F7096A3E44BAA80C7C3C9C3293D26D491AD766
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc
                                                                                  • String ID: sqlite3_bind_blob$sqlite3_bind_int$sqlite3_bind_int64$sqlite3_bind_parameter_index$sqlite3_bind_text16$sqlite3_close$sqlite3_column_blob$sqlite3_column_bytes$sqlite3_column_int$sqlite3_column_int64$sqlite3_column_text16$sqlite3_exec$sqlite3_finalize$sqlite3_open16$sqlite3_prepare16_v2$sqlite3_reset$sqlite3_step
                                                                                  • API String ID: 190572456-2634604785
                                                                                  • Opcode ID: c6900063e6f1f58e840ab128dafbd2c95afe69325bb9c3ee8f7ad832e163feb1
                                                                                  • Instruction ID: 5824c6e44f34b1b970dc4f09c8d16c86c5da5fb83a6df47551891ccc5cd06f94
                                                                                  • Opcode Fuzzy Hash: c6900063e6f1f58e840ab128dafbd2c95afe69325bb9c3ee8f7ad832e163feb1
                                                                                  • Instruction Fuzzy Hash: D351A271201F4EA5EF968BA4E8913D833A1FB4CBD7F19D125A92D46364EF38C698C710
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$Clear$Init
                                                                                  • String ID: //root/config/item$install_first_open$name$pop_count$propoganda$tray_startup$update_first_open$value
                                                                                  • API String ID: 3740757921-2166998829
                                                                                  • Opcode ID: da0fe18e004557cc7b0f2f3d8356101b6c2bfabc220260c257d30514f78ba6f4
                                                                                  • Instruction ID: aff580d4b75deea64deb7e46e4065f56afbdc634fa72071d76af76b76e89fc57
                                                                                  • Opcode Fuzzy Hash: da0fe18e004557cc7b0f2f3d8356101b6c2bfabc220260c257d30514f78ba6f4
                                                                                  • Instruction Fuzzy Hash: CDB12A72705A09DAFB95CF65D8903EC27B0FB49B99F149421FA0EA3A64DF35CA48C340
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$CriticalSectionmemset$AppendPath$??3@CountEnterErrorFileFreeInitializeLastLeaveLibraryModuleNameSpin
                                                                                  • String ID: ..\deepscan\$360Safe$360util$QueryFileCancel$QueryFileClose$QueryFileCreate$QueryFilesEx2$QuerySetOption$cloudcom2.dll
                                                                                  • API String ID: 1015768321-2684063875
                                                                                  • Opcode ID: 75acf276f5303c209b0e6b56f5e71fa6dc54d5f9daca34d9052b038fe3a01ebd
                                                                                  • Instruction ID: 85df055bf9425c6c0da70963d94a526d831783e1f19dc8973dcfbc1a34099653
                                                                                  • Opcode Fuzzy Hash: 75acf276f5303c209b0e6b56f5e71fa6dc54d5f9daca34d9052b038fe3a01ebd
                                                                                  • Instruction Fuzzy Hash: B2818032301B8896EBA6DF21ED403D933A5FB497D4F548125EA5A0BBA4DF38D768C740
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Close$FreeLibraryOpenPathQueryValuememset$AddressAppendExistsFileHandleModuleProc
                                                                                  • String ID: Init$Path$SOFTWARE\360Safe\360Ent$SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\360safe.exe$ServiceCall$\entclient\EntSvcCall_x64.dll
                                                                                  • API String ID: 1498439332-702965266
                                                                                  • Opcode ID: 7287dc7089829755e66462901955348d5673694c8cc533bc2c05e2a633cd80c9
                                                                                  • Instruction ID: 4281fb2f7f8363f35efb0fd70a638a071d20137889dcc292f685ea46b841f4e2
                                                                                  • Opcode Fuzzy Hash: 7287dc7089829755e66462901955348d5673694c8cc533bc2c05e2a633cd80c9
                                                                                  • Instruction Fuzzy Hash: 74513E32614B4996EF918F20E8557DA73A0F7897C4F549116BA9F06A79EF38C74CCB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: wcsstr$ExtensionFindPath_wcsicmp_wtoiwcschr
                                                                                  • String ID: CLSID$InprocHandler$InprocHandler32$InprocServer$InprocServer32$LocalServer$LocalServer32$Server$ShellExecute$\\?\$gfffffff$gfffffff
                                                                                  • API String ID: 3861457700-2318594275
                                                                                  • Opcode ID: 1a717cbbda8cc80c3c9297c878bbbc669d8a73a80a9fe28ac877bfe538569426
                                                                                  • Instruction ID: f5eaf3cd70d8a4233fc3eb4f5baabc932733307175318797ea3a634ab2d80fd0
                                                                                  • Opcode Fuzzy Hash: 1a717cbbda8cc80c3c9297c878bbbc669d8a73a80a9fe28ac877bfe538569426
                                                                                  • Instruction Fuzzy Hash: 3A12B672301A4886EB92DF39C8407DD23A1FB85BE5F44D211EA6D576E9EF78CA48C704
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$_wcsicmp$AppendCriticalPathSectionValue$EnterFileLeaveModuleName
                                                                                  • String ID: 360ExtHost$PCInfo$Partner$SOFTWARE\Wow6432Node\360EDRSensor$SOFTWARE\Wow6432Node\360EntSecurity$SOFTWARE\Wow6432Node\360SD$SOFTWARE\Wow6432Node\360Safe\Coop$ipartner$pid
                                                                                  • API String ID: 3226263223-3142758636
                                                                                  • Opcode ID: 628566989c82da212381fb3148179b37bd681cc2eaf5be604a1b5c7982e4b541
                                                                                  • Instruction ID: 9533c192c26b347b8b9675f8c4be5ba0e6f9fe9a3a5b632a6bc0f6ba07ebb3e1
                                                                                  • Opcode Fuzzy Hash: 628566989c82da212381fb3148179b37bd681cc2eaf5be604a1b5c7982e4b541
                                                                                  • Instruction Fuzzy Hash: CF419D31A00A0C94FB96DB22A8403D963A4F74DBE4F909225FD28677A5EF39C74EC340
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Count_cwprintf_s_lmemset$??3@Tickmemmove$??2@CriticalErrorHeapInitializeLastProcessSectionSpinrandsrand
                                                                                  • String ID: 0=%s$360safe$DomainQuery$[%s]$com$mid=%sm2=%sproduct=%scombo=%srule_group_id=%suv=%s$router$router:1
                                                                                  • API String ID: 1789426470-3446598425
                                                                                  • Opcode ID: 61786b1980ef7039dc4211af90e47e9a0e74f34993d56612bf85e9d061f4368c
                                                                                  • Instruction ID: 6d6f9855de1d8c5247af129e1c82467daf937bd8777ee679c9f2b2c93b700a4d
                                                                                  • Opcode Fuzzy Hash: 61786b1980ef7039dc4211af90e47e9a0e74f34993d56612bf85e9d061f4368c
                                                                                  • Instruction Fuzzy Hash: D8D19132204F4882EB419B69D8803DE73A0F789BE5F108226BAAD477E5DF78C649C704
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: wcscmp$Token$GlobalInformationProcess$AccountAllocCloseCurrentErrorFreeHandleLastLookupOpen
                                                                                  • String ID: LOCAL SERVICE$NETWORK SERVICE$NT AUTHORITY$SYSTEM
                                                                                  • API String ID: 3141378966-199577007
                                                                                  • Opcode ID: 8d6976f719ecb46038f7faa6d62441ad30095ab4bbf55d005c38fee77e3359ad
                                                                                  • Instruction ID: cee3605f7c7adaec53412b2e982fb153fefebb873c81ca2b5be3308eddbb09f0
                                                                                  • Opcode Fuzzy Hash: 8d6976f719ecb46038f7faa6d62441ad30095ab4bbf55d005c38fee77e3359ad
                                                                                  • Instruction Fuzzy Hash: F2517C32604B4986EBE28F14E8847DA73A5F78D7D8F518125EA5D436A4DF39C70DCB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AppendPath$FileModule$Namememset$AttributesHandle
                                                                                  • String ID: ..\$..\deepscan\$bapi64.dll
                                                                                  • API String ID: 2144934147-2390674060
                                                                                  • Opcode ID: 9d5beebac642680a506550c8be48c190e39914ceb82cb04c52bb84f1375e2870
                                                                                  • Instruction ID: 18b05e09174244348b6cef7f8f2b1baf28e5037f203e247325d4c6a64b139c1b
                                                                                  • Opcode Fuzzy Hash: 9d5beebac642680a506550c8be48c190e39914ceb82cb04c52bb84f1375e2870
                                                                                  • Instruction Fuzzy Hash: 6F514B32614A8882FBA3DB20EC443DA3361F78D7C9F859125E59A47AA5EF2DC74DC740
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: _cwprintf_s_l$??3@CountHeapProcessStringTickmemmoverandsrand
                                                                                  • String ID: %d=%s$[%s]$com$mid=%sm2=%sproduct=%scombo=%srule_group_id=%suv=%spid=%s
                                                                                  • API String ID: 2740332460-2247268028
                                                                                  • Opcode ID: 48d86df3b5eac7e439a35ff4fd84f198e4b1e974b1358ce155bcc0297089f372
                                                                                  • Instruction ID: 80426b886386f52412969e15ba132e6e65bce95777886caa6ce0aa64614bcf94
                                                                                  • Opcode Fuzzy Hash: 48d86df3b5eac7e439a35ff4fd84f198e4b1e974b1358ce155bcc0297089f372
                                                                                  • Instruction Fuzzy Hash: 5FD1C172305F4886EB51DB29E88039E73A0FB88BE8F158625AE5D077A5DF78C549C704
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcsicmp_wcsnicmp$wcsstr
                                                                                  • String ID: Software\Classes\Wow6432Node$Software\Classes\Wow6432Node\$Software\Wow6432Node$Software\Wow6432Node\$Wow6432Node$Wow6432Node\$wow6432node
                                                                                  • API String ID: 4199785700-2224805171
                                                                                  • Opcode ID: bc25291bcc814f054e7e10840494f54f48fde9230fe93c8f0d5c0c6b2b3ad0be
                                                                                  • Instruction ID: 173969ce7e51924b4f06bf421c606f91b3afd6de77e358442d966ae2f37bd097
                                                                                  • Opcode Fuzzy Hash: bc25291bcc814f054e7e10840494f54f48fde9230fe93c8f0d5c0c6b2b3ad0be
                                                                                  • Instruction Fuzzy Hash: 55517371710E48C1EBA6DB29D8843B923A1B789BE4F46C215EA39437E4DF68CB4CC745
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: FilePath$AppendExistsModuleNamememset$CriticalSection$EnterLeave
                                                                                  • String ID: ..\360SkinMgr.exe$..\360sd.exe$..\safemon\360Cactus.tpi
                                                                                  • API String ID: 2738204422-1657815065
                                                                                  • Opcode ID: 78597d9bd975c32090d8355579ef8ffe821f8875940c9f43dd2c1350df723c28
                                                                                  • Instruction ID: 05d3995d6e5afe1b7f2ff7eb98ba3dbe6d41cc5d548c72c66593806649a32fef
                                                                                  • Opcode Fuzzy Hash: 78597d9bd975c32090d8355579ef8ffe821f8875940c9f43dd2c1350df723c28
                                                                                  • Instruction Fuzzy Hash: 0E417131614A8D82EBE69B21EC953EA27A4F79D784F80C055F99E476A5DF2DC30DCB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AppendFileModuleNamePathmemset
                                                                                  • String ID: ..\360bps.dat$//lsp/fnp$//lsp/fnpw
                                                                                  • API String ID: 1620117007-629564897
                                                                                  • Opcode ID: 8b88fd5d987282aa7e8cbcbc9338ad7a6d43f93b19f4f5ae7e83081502dc9fb0
                                                                                  • Instruction ID: 9751cd454638bcc7bf23e097769634142843b259acdcdf6531404e40a8ce2858
                                                                                  • Opcode Fuzzy Hash: 8b88fd5d987282aa7e8cbcbc9338ad7a6d43f93b19f4f5ae7e83081502dc9fb0
                                                                                  • Instruction Fuzzy Hash: FF918431209B8882EAD2CF15E8847DDB7A4F7887D4F418116EA9943BA9DF7CC64DCB01
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalFileSection$EnterLeavefreemallocmemset$CloseCreateHandleReadSizeTime
                                                                                  • String ID: D063$|
                                                                                  • API String ID: 1613485820-3743183194
                                                                                  • Opcode ID: 180749bbb112b904ef6176165a202792b4826eb4bf0b5cc93a95b31eeb2a1677
                                                                                  • Instruction ID: 1c0486e52071ce2fa8a0c36d95268ac158065e3f2ce4ac4886627ad722c994ab
                                                                                  • Opcode Fuzzy Hash: 180749bbb112b904ef6176165a202792b4826eb4bf0b5cc93a95b31eeb2a1677
                                                                                  • Instruction Fuzzy Hash: 0A61AF327016588AFBD6CFA5E9457A873E9B70DBD8F008025EE0957BA8DF34C649C711
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AppendPathmemset$CriticalFileModuleNameSectionValue_wcsicmp$EnterLeave
                                                                                  • String ID: Partner$PartnerName$SOFTWARE\Wow6432Node\360EDRSensor$SOFTWARE\Wow6432Node\360EntSecurity$SOFTWARE\Wow6432Node\360SD$SOFTWARE\Wow6432Node\360Safe\Coop$pid
                                                                                  • API String ID: 264253324-3445957450
                                                                                  • Opcode ID: af17b70cf5ba9092bea16f3f380d13b2d21a94489603b21e2ef55527860ed742
                                                                                  • Instruction ID: 89340431e1bc531ff063a600718ea9f8068e08b94321d1f6c16d494f9f8bead4
                                                                                  • Opcode Fuzzy Hash: af17b70cf5ba9092bea16f3f380d13b2d21a94489603b21e2ef55527860ed742
                                                                                  • Instruction Fuzzy Hash: 98319A32A00A4896FBA29F21AC443D967A0F74D7E4F808615FD68576E8DF79C78DC350
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??2@rand$??3@CountCriticalHeapInitializeProcessSectionTickmemsetsrand
                                                                                  • String ID: 360safe$WifiCheckQuery$http://%s/wcheckquery$wificheck$wificheck:1
                                                                                  • API String ID: 2719022499-1298750920
                                                                                  • Opcode ID: ba48bf925f8ff20436e767d0bb5c933ca5c9980a21313222aabcab8ee4652180
                                                                                  • Instruction ID: c937e0c4e90421d2c820d9f7251a3693a618876eb833e6d48c240cb9fefbc629
                                                                                  • Opcode Fuzzy Hash: ba48bf925f8ff20436e767d0bb5c933ca5c9980a21313222aabcab8ee4652180
                                                                                  • Instruction Fuzzy Hash: 31A19E72201F0891EA96DF29D8443DD33A0FB49BE8F558625EA6D077D1EF78C689C344
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Close$Open$QueryValue$PathProcess$AddressAppendCommandCurrentExistsFileFreeHandleLibraryLineProcTokenmemsetwcsstr
                                                                                  • String ID: /elevated$SOFTWARE\360Safe\360Ent$ServiceCall
                                                                                  • API String ID: 3868077243-983453937
                                                                                  • Opcode ID: e8e6a48d377b8b947be7de055ef0add81918a1ec871415dff66262798b1d0c29
                                                                                  • Instruction ID: 15e9288aeb9452e37e9dffc63771de1b8c488dcb05314bb0ab77bc9e2c882ef0
                                                                                  • Opcode Fuzzy Hash: e8e6a48d377b8b947be7de055ef0add81918a1ec871415dff66262798b1d0c29
                                                                                  • Instruction Fuzzy Hash: 1C514F72B00B188AFB919F65DC847DC33B5BB48BA8F148125EE2A536A5DF34CA49C740
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressCurrentFolderFromHandleListLocationMallocModulePathProcProcessSpecialwcsstr
                                                                                  • String ID: (x86)$IsWow64Process$Kernel32.dll$\SysWOW64$\System32
                                                                                  • API String ID: 3215350457-2087702655
                                                                                  • Opcode ID: bf72767515c204881d1f258e158e1a3830e9824de3f932ee163774af780d841d
                                                                                  • Instruction ID: 20fdff06134b497470b840b0dc70d8e75aaa21696b334e6b55e82bb231538848
                                                                                  • Opcode Fuzzy Hash: bf72767515c204881d1f258e158e1a3830e9824de3f932ee163774af780d841d
                                                                                  • Instruction Fuzzy Hash: 58411C7120574882FB96DB65EC543E932A0BB8DBE0F55C226A9A9477A5DF38C74DC300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$String$EnterLeave$AllocByte$CountFreeTickrandsrand
                                                                                  • String ID:
                                                                                  • API String ID: 2388112003-0
                                                                                  • Opcode ID: 601ce5742b1ae8d3f199bb9b56dc9d4efdb3fb2238afb3afbe88db3bb5de28ba
                                                                                  • Instruction ID: ae2396e8f272108b73aaedae01213fa34c0c0a48780782be1cf856f1cb9becad
                                                                                  • Opcode Fuzzy Hash: 601ce5742b1ae8d3f199bb9b56dc9d4efdb3fb2238afb3afbe88db3bb5de28ba
                                                                                  • Instruction Fuzzy Hash: D7C1A133711E4986FB86CF6598843ED23A0F748BE8F498215EE295B794DF34CA49C344
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 0000000180062148: memset.MSVCRT ref: 000000018006217C
                                                                                    • Part of subcall function 0000000180062148: GetModuleFileNameW.KERNEL32 ref: 0000000180062193
                                                                                    • Part of subcall function 0000000180062148: PathCombineW.SHLWAPI ref: 00000001800621AA
                                                                                    • Part of subcall function 0000000180062148: GetProcAddress.KERNEL32 ref: 00000001800621DB
                                                                                    • Part of subcall function 0000000180062148: GetProcAddress.KERNEL32 ref: 00000001800621EF
                                                                                    • Part of subcall function 0000000180062148: GetProcAddress.KERNEL32 ref: 0000000180062203
                                                                                    • Part of subcall function 0000000180062148: GetProcAddress.KERNEL32 ref: 0000000180062217
                                                                                    • Part of subcall function 0000000180062148: GetProcAddress.KERNEL32 ref: 000000018006222B
                                                                                    • Part of subcall function 0000000180062148: GetProcAddress.KERNEL32 ref: 000000018006223F
                                                                                    • Part of subcall function 0000000180062148: GetProcAddress.KERNEL32 ref: 0000000180062253
                                                                                    • Part of subcall function 0000000180062148: GetProcAddress.KERNEL32 ref: 0000000180062267
                                                                                    • Part of subcall function 0000000180062148: GetProcAddress.KERNEL32 ref: 000000018006227B
                                                                                    • Part of subcall function 0000000180062148: GetProcAddress.KERNEL32 ref: 000000018006228F
                                                                                  • OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0000000180060B9F
                                                                                  • CloseHandle.KERNEL32 ref: 0000000180060BD7
                                                                                  • OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0000000180060BF2
                                                                                  • GetModuleFileNameExW.PSAPI(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0000000180060C0E
                                                                                  • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0000000180060C1F
                                                                                  • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0000000180060C2F
                                                                                  • OpenProcess.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0000000180060C4A
                                                                                  • CloseHandle.KERNEL32 ref: 0000000180060C76
                                                                                  • SysFreeString.OLEAUT32 ref: 0000000180060C89
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$HandleModuleOpenProcess$CloseFileName$CombineFreePathStringmemset
                                                                                  • String ID: Kernel32.dll$QueryFullProcessImageNameW
                                                                                  • API String ID: 930578061-1170590071
                                                                                  • Opcode ID: 21058d059558c167eb128ecc070ccb7a1d86f5313822a2293c00ae13ac054d8f
                                                                                  • Instruction ID: 54324c73b988387a6f6bb080a4d890c873d93734858c8758c4fce1d00ab0755c
                                                                                  • Opcode Fuzzy Hash: 21058d059558c167eb128ecc070ccb7a1d86f5313822a2293c00ae13ac054d8f
                                                                                  • Instruction Fuzzy Hash: AD418231B01F089AE751CBA2EC04BDD72A2BB4DBD4F548524EE69637A4DF388619C344
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Version$AddressHandleModuleProcValueatoimemset
                                                                                  • String ID: CurrentVersion$RtlGetVersion$SOFTWARE\Microsoft\Windows NT\CurrentVersion$ntdll.dll
                                                                                  • API String ID: 1009632096-1820686997
                                                                                  • Opcode ID: 96873d62ae8b00b27b2edc00cc4e017e8c26c7791766384428e26c81b31d8715
                                                                                  • Instruction ID: 603b8f84a57364ab934b969a098bbde4f8155cf87e7eb2653b8acdc6aa15b94a
                                                                                  • Opcode Fuzzy Hash: 96873d62ae8b00b27b2edc00cc4e017e8c26c7791766384428e26c81b31d8715
                                                                                  • Instruction Fuzzy Hash: 0F416D31615A498AF792CF20EC883DB77A0F78C7A5F918115F56A426A8DF3CD24CCB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: _errno$?terminate@@C_specific_handlerabortfreeiswctype
                                                                                  • String ID: csm$f
                                                                                  • API String ID: 3008409500-629598281
                                                                                  • Opcode ID: cb4ff8b5ebe89d3986471470a6de958979d9adc1f1dde0f1a6724a9577e23cc3
                                                                                  • Instruction ID: 7b0f8dd17277ba6112c52f93bbbd1643d611d3ff89c652db72cc518acb6e3753
                                                                                  • Opcode Fuzzy Hash: cb4ff8b5ebe89d3986471470a6de958979d9adc1f1dde0f1a6724a9577e23cc3
                                                                                  • Instruction Fuzzy Hash: 1D819172781B0889FBA6DFA490503EC23E0EF4C7D8F048515FA5917BC9DE3A8A599321
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AuthorityCountCurrentExecuteProcessShellWindow$CreateErrorFindForegroundInformationInitializeInstanceLastQueryServiceTickTokenUnknown_memsetsrandwcsstr
                                                                                  • String ID: Progman$Program manager$http://$open$p
                                                                                  • API String ID: 1516062321-2122229248
                                                                                  • Opcode ID: 58ac5753a69af218fee8d4caaaed4576b5dee7a80132d74c2a967a22724bbafe
                                                                                  • Instruction ID: 5854d287d17234f5949c9620cb83c855c738d658d9246579e802d6f7b8ceff8d
                                                                                  • Opcode Fuzzy Hash: 58ac5753a69af218fee8d4caaaed4576b5dee7a80132d74c2a967a22724bbafe
                                                                                  • Instruction Fuzzy Hash: A971A672209F8981FBA19B29D4913DE7360F7C97F4F058326BA6942AD5DF38C648C744
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Path$AppendCloseFileModulememset$AddressExistsHandleHeapNameProcProcessQueryValue_wcsicmp
                                                                                  • String ID: SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\App Paths\360EDRSensor.exe$safemon\360EDRSensor.exe
                                                                                  • API String ID: 1838183957-848848004
                                                                                  • Opcode ID: 53d40d4281f59d1785bb74b81d44e61fae45e923a74e0e4f630338c30aea0692
                                                                                  • Instruction ID: 12369466515329e4b94078003e01a8293ee627d21bf6a1b54a8e48e621231722
                                                                                  • Opcode Fuzzy Hash: 53d40d4281f59d1785bb74b81d44e61fae45e923a74e0e4f630338c30aea0692
                                                                                  • Instruction Fuzzy Hash: F9617132614A4886EBA1DF25E8543DA73A4FB8C7E4F408215BAAD437E5DF39C749CB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Path$AppendCloseFileModulememset$AddressExistsHandleHeapNameProcProcessQueryValue_wcsicmp
                                                                                  • String ID: SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\App Paths\360ExtHost.exe$safemon\360ExtHost.exe
                                                                                  • API String ID: 1838183957-351904165
                                                                                  • Opcode ID: 1e39c5d7731f9f0cfe2357af418d2a02b58939d64fc7587de7a383dead0b9532
                                                                                  • Instruction ID: 01aece9f02afbb37390a2111cb2c5fee408a8cfe5dec439bdff79febd640f7a5
                                                                                  • Opcode Fuzzy Hash: 1e39c5d7731f9f0cfe2357af418d2a02b58939d64fc7587de7a383dead0b9532
                                                                                  • Instruction Fuzzy Hash: 27615132614A4892EBA1DB25E8543DA73A4FB8C7E4F448315BAAD436F5DF39C749CB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??3@$CriticalDeleteSection
                                                                                  • String ID: %s\NameSpace_Catalog5\Catalog_Entries64\%012d$%s\NameSpace_Catalog5\Catalog_Entries\%012d$Num_Catalog_Entries$Num_Catalog_Entries64$SYSTEM\CurrentControlSet\Services\WinSock2\Parameters$SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\NameSpace_Catalog5
                                                                                  • API String ID: 1297904149-2676930693
                                                                                  • Opcode ID: 3d1b4d4945e0e21b4209534fb7adf2456145591c447b83fcd6c449b0aaaa6bb8
                                                                                  • Instruction ID: 73cc0848a655b1fb88aa06a885314cf1e75da9385d723178a5cf1b8a64167aea
                                                                                  • Opcode Fuzzy Hash: 3d1b4d4945e0e21b4209534fb7adf2456145591c447b83fcd6c449b0aaaa6bb8
                                                                                  • Instruction Fuzzy Hash: F631F232741B4892EF668F25E4443DC63A0F74ABE0F588621EB5C07BA5CF39D5A9C300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNEL32(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A907
                                                                                  • FindResourceW.KERNEL32(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A91F
                                                                                  • SizeofResource.KERNEL32(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A933
                                                                                  • LoadResource.KERNEL32(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A942
                                                                                  • LockResource.KERNEL32(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A953
                                                                                  • malloc.MSVCRT(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A964
                                                                                  • memmove.MSVCRT(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A97B
                                                                                  • FreeResource.KERNEL32(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A983
                                                                                  • FreeLibrary.KERNEL32(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A98C
                                                                                  • VerQueryValueW.VERSION(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A9B4
                                                                                  • free.MSVCRT(?,00000000,?,?,00000000,000000018003AAB8,?,?,?,?,00000000), ref: 000000018003A9D9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Resource$FreeLibraryLoad$FindLockQuerySizeofValuefreemallocmemmove
                                                                                  • String ID:
                                                                                  • API String ID: 3317409091-0
                                                                                  • Opcode ID: d575d481ff84caad7d8740059adda23fe9f9648e66c4b8f54cfb60a62ec78070
                                                                                  • Instruction ID: 8185c375a913dccbf35fde3c3455573a2fd048fb7f01b55c3a130ccbeb9ebe14
                                                                                  • Opcode Fuzzy Hash: d575d481ff84caad7d8740059adda23fe9f9648e66c4b8f54cfb60a62ec78070
                                                                                  • Instruction Fuzzy Hash: 09316B35606B4886EA86DF16AC0479AB3E4BB4DFC0F0A8426AE4907764EF3CD649C700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Resource$FreeLibraryLoad$FindLockQuerySizeofValuefreemallocmemmove
                                                                                  • String ID:
                                                                                  • API String ID: 3317409091-0
                                                                                  • Opcode ID: c78e14dcb0124c7fdfddeb6e32502328b3625422cacc1ce2de84f055e235b1f2
                                                                                  • Instruction ID: 7be624b5aba991f8dce8e488531e7c4bc30f0810fde0e2206e2c198a200c07cc
                                                                                  • Opcode Fuzzy Hash: c78e14dcb0124c7fdfddeb6e32502328b3625422cacc1ce2de84f055e235b1f2
                                                                                  • Instruction Fuzzy Hash: F5316D31702B448AEB87DF6AA84479977E0BB4CFD4F098425AE0907764EF38D64AC700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Valuememset$CloseEnumOpen
                                                                                  • String ID: stat
                                                                                  • API String ID: 3313869694-548994849
                                                                                  • Opcode ID: 021697519deb37d11cec93fa9a5ab951d19f885d93b4615a5ee70ee1a279cb79
                                                                                  • Instruction ID: bca1fd9f3236c41ce4b8b5e5b78ce057e793223580287a74ffbbd9e6a5e702b7
                                                                                  • Opcode Fuzzy Hash: 021697519deb37d11cec93fa9a5ab951d19f885d93b4615a5ee70ee1a279cb79
                                                                                  • Instruction Fuzzy Hash: 4E616076614A8896D7A2CF25E4403DB77A4F7897D4F518216EB9C43BA8DF39C609CB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset$CloseCommandExecuteFileHandleLineModuleNameShell
                                                                                  • String ID: /elevated$MPR.dll$runas
                                                                                  • API String ID: 3400839104-479190379
                                                                                  • Opcode ID: ff0e70aebe942903d03514da05f5171b976ef8719cbab5a1757af81890fa035d
                                                                                  • Instruction ID: c5738ef19aefcfe0893ce15e6bbb4f81d570db0aa822fd902f1c1618a14612e4
                                                                                  • Opcode Fuzzy Hash: ff0e70aebe942903d03514da05f5171b976ef8719cbab5a1757af81890fa035d
                                                                                  • Instruction Fuzzy Hash: 35518F32611B4481EB919B29D85039A73A5FB88BF4F108316FABE437E4DF38C649C740
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: FromString_wcsupr$HeapProcess
                                                                                  • String ID:
                                                                                  • API String ID: 2249050647-0
                                                                                  • Opcode ID: af4d7778e813cec4d2260f242f830c925d5e0839e1a4af0d89802f64c8607ec2
                                                                                  • Instruction ID: c2b84f69b377f8d486519554b3a5ef31eab8a077f1ecb1a3c09cbb62b7b5dce0
                                                                                  • Opcode Fuzzy Hash: af4d7778e813cec4d2260f242f830c925d5e0839e1a4af0d89802f64c8607ec2
                                                                                  • Instruction Fuzzy Hash: A5A19E36302A4881EBE79F15D8403E963A1FB58BD4F45C116EA5E5B6E9DF38CB89D300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Process32$FirstNext$wsprintf$AllocateCloseCreateHandleMemorySnapshotToolhelp32Virtual
                                                                                  • String ID:
                                                                                  • API String ID: 3605396869-0
                                                                                  • Opcode ID: bb05992a4f7f9f49a53442d2e1aaa10a6dfd61868bba92c4a54245666e2faaf4
                                                                                  • Instruction ID: d90c1bca6a782a4c22c109914a8abe53440f5c5a9064bd137ed4e488ea72d955
                                                                                  • Opcode Fuzzy Hash: bb05992a4f7f9f49a53442d2e1aaa10a6dfd61868bba92c4a54245666e2faaf4
                                                                                  • Instruction Fuzzy Hash: 33C1D776209B85D9DA30DB15E4903DAB7A5FBD9384F804126EBCD43B68EF38C649CB40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharCriticalMultiSectionWidehtonlhtons$EnterLeavememmove
                                                                                  • String ID:
                                                                                  • API String ID: 505489203-0
                                                                                  • Opcode ID: a07653937a79e70b2ab9cb09c4e22017cd899243124cbf7044e450a9eefd8b59
                                                                                  • Instruction ID: 546e40b67bc81cdcf22b9085e67948acfa9500907e31d87aed3a5e4506fe483b
                                                                                  • Opcode Fuzzy Hash: a07653937a79e70b2ab9cb09c4e22017cd899243124cbf7044e450a9eefd8b59
                                                                                  • Instruction Fuzzy Hash: A6711C32B05B548AFB96CFA1E8403ED33B5B70879DF468025EE5627A98DF38C659C344
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: %s\NameSpace_Catalog5\Catalog_Entries64\%012d$%s\NameSpace_Catalog5\Catalog_Entries\%012d$Num_Catalog_Entries$Num_Catalog_Entries64$SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\NameSpace_Catalog5
                                                                                  • API String ID: 0-1196714001
                                                                                  • Opcode ID: 568fd741c3bdcc21c426c5afc4ac46b45918c5554304f1a676603b4f6589036a
                                                                                  • Instruction ID: 902fc08f0a24e927d00bac490aa4b2e4fc0ab2cffff010c51715f7c20a33671b
                                                                                  • Opcode Fuzzy Hash: 568fd741c3bdcc21c426c5afc4ac46b45918c5554304f1a676603b4f6589036a
                                                                                  • Instruction Fuzzy Hash: 8B91E232701B4886EB96CB62A8407D973A0FB8DBD4F058225BF6D17795EF39CA49C700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: String$??3@FreeFromHeapProcess_wcsupr_wtoi
                                                                                  • String ID: hotkey$internetshortcut
                                                                                  • API String ID: 2885337837-1159320594
                                                                                  • Opcode ID: a2454b8e8b8246686a3b2ba7e9ac3c3560326eba55912cdd4e74c1efac8119ef
                                                                                  • Instruction ID: 4557ede77b3344c9b7d134b2ef366cc1eba795b6e68afc4d6349487d3a9816dc
                                                                                  • Opcode Fuzzy Hash: a2454b8e8b8246686a3b2ba7e9ac3c3560326eba55912cdd4e74c1efac8119ef
                                                                                  • Instruction Fuzzy Hash: 56915972701B4886EB96DF69D84079D33A0F748BE4F44C626AA6D477E4DF38CA99C340
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentSleepThread
                                                                                  • String ID: JudgeVersion
                                                                                  • API String ID: 1164918020-3141317846
                                                                                  • Opcode ID: 2437360cf512e5b62a46a09ef29253c79db304fd769a9f3e4dce4e3854d29d87
                                                                                  • Instruction ID: 47c15e1018a900855fb3b169089698e2b9417bb7c9542535bb0a2760737ebbf6
                                                                                  • Opcode Fuzzy Hash: 2437360cf512e5b62a46a09ef29253c79db304fd769a9f3e4dce4e3854d29d87
                                                                                  • Instruction Fuzzy Hash: EE51AB32604A889AFB979F65DD843DE73A1F3097D4F468525EA2A83790DF34CA99C340
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$AttributesDeleteErrorLast$MutexRelease
                                                                                  • String ID: PRAGMA synchronous = OFF;
                                                                                  • API String ID: 874664252-1854902270
                                                                                  • Opcode ID: 1145e7b794f1c9dbefaeeafce65ce3907897fb728955ac70424f53ad1c5898c9
                                                                                  • Instruction ID: fa77642fd0660764f5a509da37546a8681fbf34ddf7b90f5fa11f8d2a21f9c13
                                                                                  • Opcode Fuzzy Hash: 1145e7b794f1c9dbefaeeafce65ce3907897fb728955ac70424f53ad1c5898c9
                                                                                  • Instruction Fuzzy Hash: 6551A335700B8996FEDE8F6594517B92390AB4DBD4F048524BEAE677E0DF35CA098300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Path$Exists$ModuleNameRemoveSpecmemset
                                                                                  • String ID: %hd.%hd.%hd.%hd$\360ver.dll$\QHVer.dll
                                                                                  • API String ID: 3680197243-1037704697
                                                                                  • Opcode ID: 3e80556d967b03fa81a8d0e192ef84c8c157516f2ebd988b45dcbe8060877e80
                                                                                  • Instruction ID: 3305af636dff0720fe62b84610ade698e39c861821be0ce054630d245facfc05
                                                                                  • Opcode Fuzzy Hash: 3e80556d967b03fa81a8d0e192ef84c8c157516f2ebd988b45dcbe8060877e80
                                                                                  • Instruction Fuzzy Hash: 73516572701A4982E751DB29D84078A77A0F789BF4F408212FA6D877E5DF39CA49CB40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??2@CriticalSection$??3@Deleterand$CountInitializeTickmemsetsrand
                                                                                  • String ID: http://%s/dquery
                                                                                  • API String ID: 3689213441-2489601265
                                                                                  • Opcode ID: 3d6c1d3a1db6c1d00b31d5721a07cc2654ec57c957b64071c42c049315398c83
                                                                                  • Instruction ID: 80c6b5da0a524930356cbb69355e12e6cacd4ac9a253962bc35af1aeed2dd264
                                                                                  • Opcode Fuzzy Hash: 3d6c1d3a1db6c1d00b31d5721a07cc2654ec57c957b64071c42c049315398c83
                                                                                  • Instruction Fuzzy Hash: F3619076211F4986E7829B64EC843D933A0FB497A8F518316ED29076E5EF78C78DC344
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Path$CriticalExistsModuleNameSection$AppendCloseControlCreateCurrentDeviceEnterHandleLeaveProcessmemset
                                                                                  • String ID: \Config\MessageCenter.db$\deepscan\heavygate64.dll$\heavygate64.dll
                                                                                  • API String ID: 830827343-1853890022
                                                                                  • Opcode ID: 298258ffcac91158a1fef4f3201ca6457f5d35ecb6e0b41006b5da1b8766b288
                                                                                  • Instruction ID: ed8f6b5c495fe7c06dfc5e892af335cc1c0a2688f7bbfb93a7c5ae832a2d3b97
                                                                                  • Opcode Fuzzy Hash: 298258ffcac91158a1fef4f3201ca6457f5d35ecb6e0b41006b5da1b8766b288
                                                                                  • Instruction Fuzzy Hash: 12413B72214A8995EBB5DF21EC413D92360F7897C8F808112FA4D9B5A9DF39C70DCB40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeFromPathTaskmemset$AttributesCombineCreateFileList
                                                                                  • String ID: :
                                                                                  • API String ID: 2941325240-336475711
                                                                                  • Opcode ID: b7718fc7bab466bf75feea53bf66271dcee3e8f8e01a932515278184e63cf5ba
                                                                                  • Instruction ID: dc65f2bc49bddac93e31888ce9d3fd3537e0c7ef9c239f6ea7558133a88505f1
                                                                                  • Opcode Fuzzy Hash: b7718fc7bab466bf75feea53bf66271dcee3e8f8e01a932515278184e63cf5ba
                                                                                  • Instruction Fuzzy Hash: 7731747260458881EAB5DB16E4543ED7361FB8CBC4F44D115FA4E86AA5DF3CCB49C704
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassNameTextWindowmemset
                                                                                  • String ID: ApplicationFrameWindow$Microsoft Edge
                                                                                  • API String ID: 1817102812-2764675319
                                                                                  • Opcode ID: bdc5f29d5c31fe96e361a90c3735c845403ae182fb6ea73bd058871bc7ed945a
                                                                                  • Instruction ID: cbb3fe303a1e4ce820f684c33e5910fd11efe3c021ca595ae8cabc946684c7f6
                                                                                  • Opcode Fuzzy Hash: bdc5f29d5c31fe96e361a90c3735c845403ae182fb6ea73bd058871bc7ed945a
                                                                                  • Instruction Fuzzy Hash: 3721943135478985FAA19F65E8843DA6361F78C7C4F648125AAAD872A4EF7CC74DC700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProc$Delete
                                                                                  • String ID: Advapi32.dll$RegDeleteKeyExW$RegDeleteKeyTransactedW
                                                                                  • API String ID: 2668475584-1053001802
                                                                                  • Opcode ID: 0b7aaba438b382d164bc0afc74327b597900df9609eba397915e0a396ce3b562
                                                                                  • Instruction ID: 915c5fbfce3db82b286e5c0612373c0c02ac60b4c6bcd7d6af2be75d68b23045
                                                                                  • Opcode Fuzzy Hash: 0b7aaba438b382d164bc0afc74327b597900df9609eba397915e0a396ce3b562
                                                                                  • Instruction Fuzzy Hash: 9F314675209A4891FBA2CB11EC047D973A0BB4DBD4F58C025AE9A07BA4EF3CC748D310
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$AppendCriticalPathSection$memset$EnterFileModuleName$??2@CountErrorInitializeLastLeaveSpin
                                                                                  • String ID: ..\deepscan\$speedmem2.hg
                                                                                  • API String ID: 2338990259-1390971677
                                                                                  • Opcode ID: 1f5c69f5d04849719002e6335fbd6f545d460fa84012e21aa4d7e04e73bbc5ea
                                                                                  • Instruction ID: 91bce694e0342d9d21a92653d8ecf9702c458f92e478111cc4d5f0d53c5c3f7e
                                                                                  • Opcode Fuzzy Hash: 1f5c69f5d04849719002e6335fbd6f545d460fa84012e21aa4d7e04e73bbc5ea
                                                                                  • Instruction Fuzzy Hash: BB212C35215B4D81EA928B64FC953996360FB5C7E4F409215E96D077B4EF78C64EC700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSectionhtonlhtons$EnterLeavememmove
                                                                                  • String ID:
                                                                                  • API String ID: 33644419-0
                                                                                  • Opcode ID: c447bd6221281bfe5dd6872084f78464a8d5e064d41710de40e0bf531ce06f55
                                                                                  • Instruction ID: 90b71582b8c4a32b78347334d3d295f004072f45cff62f784db803bd1658b447
                                                                                  • Opcode Fuzzy Hash: c447bd6221281bfe5dd6872084f78464a8d5e064d41710de40e0bf531ce06f55
                                                                                  • Instruction Fuzzy Hash: 69614736B00B549AF792DFA1E9503ED33B5B70878CF458019EE5627A98DF34866EC348
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitVariant$ArraySafe$CreateElement
                                                                                  • String ID:
                                                                                  • API String ID: 3308809976-0
                                                                                  • Opcode ID: 3e6f35141bead04b4f889ba04b40996eb253cad0316321e95f0b8ebe6d532838
                                                                                  • Instruction ID: 146264a788ca7c4eb20d782c9947d04824275c30ee96bc1b713ea33f9e3da92e
                                                                                  • Opcode Fuzzy Hash: 3e6f35141bead04b4f889ba04b40996eb253cad0316321e95f0b8ebe6d532838
                                                                                  • Instruction Fuzzy Hash: 52515A32B00A548AE781CFA5EC843DD37B0F7487A9F158125EA5A97764EF34C64AC340
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcsicmp
                                                                                  • String ID: %I64u$.exe$InitString$SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\
                                                                                  • API String ID: 2081463915-3789319691
                                                                                  • Opcode ID: a7524d0a6a2f2a6811e2d6bfe887dea111f6d1a43d9b514e68db11bdf2e08a92
                                                                                  • Instruction ID: 99d661dcfab4fd9f60583e58d61e1d075c9151c162a47e32eebc6396990c7acc
                                                                                  • Opcode Fuzzy Hash: a7524d0a6a2f2a6811e2d6bfe887dea111f6d1a43d9b514e68db11bdf2e08a92
                                                                                  • Instruction Fuzzy Hash: A8C1B172710A488AEB929B25D8407DD33A0F749BE8F448216FE6D47BE5DF38C689C744
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: wcschrwcscmpwcsstr$FromHeapProcessString_wcslwr
                                                                                  • String ID: clsid$clsid2
                                                                                  • API String ID: 2934854147-3646038404
                                                                                  • Opcode ID: 911e3de000ae97c58b3acce3279f437468a1569be05101070c01195505b2f66e
                                                                                  • Instruction ID: bd95a24bb0aafbb45aea4f5794df0f126b37bc211fbb868afd4ed2029302fca7
                                                                                  • Opcode Fuzzy Hash: 911e3de000ae97c58b3acce3279f437468a1569be05101070c01195505b2f66e
                                                                                  • Instruction Fuzzy Hash: 86A16172701A4885EBA79B29C8503EE63A1FB49BD4F46C122FA1D477D6EF74CA49C340
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??3@memmovememset
                                                                                  • String ID: generic$unknown error
                                                                                  • API String ID: 2528313377-3628847473
                                                                                  • Opcode ID: de4f988636b97df9b255ecc11943299432ed388bb3462f1d961b5968a0cd6148
                                                                                  • Instruction ID: f953be595861da4e4b866d1587ee45b735e1f1b3269ec21885f27e4079069760
                                                                                  • Opcode Fuzzy Hash: de4f988636b97df9b255ecc11943299432ed388bb3462f1d961b5968a0cd6148
                                                                                  • Instruction Fuzzy Hash: 4451A372704B8882EF459B16DA443AD6362F749BD0F50C221FB6A07BD6EF78C6A59340
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Library$AddressFreeHandleLoadModuleProc
                                                                                  • String ID: AddDllDirectory$kernel32
                                                                                  • API String ID: 1437655972-3758863895
                                                                                  • Opcode ID: 62d5c79b2ea4fb088856e3f0301c9a109d3b9d8bbbaf54877c47554339dab04f
                                                                                  • Instruction ID: bbf3e12eda5f2f818c86a6d8723dcf8fbef42ab492d342ab48d7d832c77590ad
                                                                                  • Opcode Fuzzy Hash: 62d5c79b2ea4fb088856e3f0301c9a109d3b9d8bbbaf54877c47554339dab04f
                                                                                  • Instruction Fuzzy Hash: 7751E53231164885FEA6CF51E4103E962A0FB5DBE4F48C621EA6A4B7D4DF3DC649C705
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$EnterErrorLastLeavememsetstd::_std::exception_ptr::exception_ptr
                                                                                  • String ID: arm64$x64$x86
                                                                                  • API String ID: 4069188616-280937049
                                                                                  • Opcode ID: 80f3249773d162cbeeb550be5abaaeac6b7c95d6a1b3ac1e44b50876622fa97b
                                                                                  • Instruction ID: 117583cd4254ef97ff9b72dc100ece26d9127ce95370434fd6434e2e215e4972
                                                                                  • Opcode Fuzzy Hash: 80f3249773d162cbeeb550be5abaaeac6b7c95d6a1b3ac1e44b50876622fa97b
                                                                                  • Instruction Fuzzy Hash: 78415B71B00A1C95FA92DB20EC843D937A4F70C7E8FA58611F96A536E6DF34C68AC740
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressCurrentErrorHandleLastModuleProcProcessstd::_std::exception_ptr::exception_ptr
                                                                                  • String ID: IsWow64Process2$Kernel32.dll
                                                                                  • API String ID: 1364622999-2175735969
                                                                                  • Opcode ID: 6751241f688bd49d1875dc8d854f79e14c2fff9f0de6f06901ba81ab434c2c27
                                                                                  • Instruction ID: 5a1c62e2a9ead4f3428123871bab1930646db393e55966b9c052552951b7636c
                                                                                  • Opcode Fuzzy Hash: 6751241f688bd49d1875dc8d854f79e14c2fff9f0de6f06901ba81ab434c2c27
                                                                                  • Instruction Fuzzy Hash: DD416531204B4991EAA2CF14EC843DA73A4FB8D794FA18226F659437A5DF38CB4DCB44
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$Leave$AddressEnterFreeInitializeLibraryProc
                                                                                  • String ID: InitLibs
                                                                                  • API String ID: 388043826-2748520195
                                                                                  • Opcode ID: d54e888b80642ae16c136f4daec8858b4574610897ae795fcaa0a3f587715d16
                                                                                  • Instruction ID: 14a8bfa7cef1bdae3a626f07b321ff872beb2833b4a3adf2d3b4914cd80619d3
                                                                                  • Opcode Fuzzy Hash: d54e888b80642ae16c136f4daec8858b4574610897ae795fcaa0a3f587715d16
                                                                                  • Instruction Fuzzy Hash: 5631953661874882EBA78F25A4547AE23B0F78DFD4F1A9125ED5A473A4DF38C649CB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileName_wcsicmp$FindModulePathmemset
                                                                                  • String ID: 360tray.exe$QHSafeTray.exe
                                                                                  • API String ID: 2436975468-72543816
                                                                                  • Opcode ID: a7768d738e7b534716dd32aca9e4ff23bf3b7449249a9ac96035ea6388957e04
                                                                                  • Instruction ID: f13d88eabac643da90db78e2c45270d8f51b6174de2d3bfd56aa28c15744bb18
                                                                                  • Opcode Fuzzy Hash: a7768d738e7b534716dd32aca9e4ff23bf3b7449249a9ac96035ea6388957e04
                                                                                  • Instruction Fuzzy Hash: 86114230615B4882FBA6CB21EC593D62364FB8C7A5F408225E56A867E5EF3DC74DCB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 0013AD34: NtAllocateVirtualMemory.NTDLL ref: 0013AD6A
                                                                                    • Part of subcall function 00137E90: SHGetFolderPathW.SHELL32 ref: 00137EC3
                                                                                  • wsprintfW.USER32 ref: 0013424D
                                                                                  • wsprintfW.USER32 ref: 001342A8
                                                                                  • wsprintfW.USER32 ref: 001343C3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: wsprintf$AllocateFolderMemoryPathVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 206084008-0
                                                                                  • Opcode ID: 3f0a1096dd83600a13c208f95dfa09032702bdcf8618f0e5637695aff639911f
                                                                                  • Instruction ID: 33fa18e80fd0d32cbb379dad9d5152cf90c8dd4af6d979dbeb00c60d82ca31fc
                                                                                  • Opcode Fuzzy Hash: 3f0a1096dd83600a13c208f95dfa09032702bdcf8618f0e5637695aff639911f
                                                                                  • Instruction Fuzzy Hash: 5BC1E732219BC596DA60EB10F4913DBB7A1FBD8340F905426EACD87A69EF7CC549CB40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection_time64$EnterLeave
                                                                                  • String ID:
                                                                                  • API String ID: 3499907473-0
                                                                                  • Opcode ID: fad2f7b7927532790d07ba8be1895770e69b37db2dedf9ef4961b264574dfbe7
                                                                                  • Instruction ID: 2d3d355faa5a201e66dfe59503a55f94d93e9d2144db4385c4ebef4b0973e561
                                                                                  • Opcode Fuzzy Hash: fad2f7b7927532790d07ba8be1895770e69b37db2dedf9ef4961b264574dfbe7
                                                                                  • Instruction Fuzzy Hash: B9517B31605B4889FB968F25E9543D933A5FB0EBE8F548115FD5A27764CF39C689C300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: _errno
                                                                                  • String ID:
                                                                                  • API String ID: 2918714741-0
                                                                                  • Opcode ID: 97c6daf75c94dd34b649a7a3f9a9ab6583bbf65966f83f2829fedd4982e22aff
                                                                                  • Instruction ID: 8158435372b26aa4a6dd2edb7174a458af360551698bfd787e5366ef90707461
                                                                                  • Opcode Fuzzy Hash: 97c6daf75c94dd34b649a7a3f9a9ab6583bbf65966f83f2829fedd4982e22aff
                                                                                  • Instruction Fuzzy Hash: 0441A733604A4886EAA36FA9A4003DD7290BB8C7F4F55C310FA684B7D6CF3DC6598711
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • wsprintfA.USER32 ref: 00135BB7
                                                                                  • wsprintfA.USER32 ref: 00135CA6
                                                                                  • wsprintfA.USER32 ref: 00135DCD
                                                                                  • new[].LIBCPMTD ref: 00135E75
                                                                                    • Part of subcall function 00134D20: InternetCloseHandle.WININET ref: 00134F33
                                                                                    • Part of subcall function 00134D20: InternetCloseHandle.WININET ref: 00134F46
                                                                                  • new[].LIBCPMTD ref: 00135FA3
                                                                                  • GetExitCodeThread.KERNEL32 ref: 001361C3
                                                                                  • GetExitCodeThread.KERNEL32 ref: 001361FC
                                                                                    • Part of subcall function 0013AD34: NtAllocateVirtualMemory.NTDLL ref: 0013AD6A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: wsprintf$CloseCodeExitHandleInternetThreadnew[]$AllocateMemoryVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 511820185-0
                                                                                  • Opcode ID: c733c1eb138d61e5c7cccf2536b94b4266d490a8e64c5f5d78646b0364d0b340
                                                                                  • Instruction ID: 33f26353f881e9d2c12f311749bea7777a10d8a17e1469cef85af5cfd2f2ce7a
                                                                                  • Opcode Fuzzy Hash: c733c1eb138d61e5c7cccf2536b94b4266d490a8e64c5f5d78646b0364d0b340
                                                                                  • Instruction Fuzzy Hash: A342B272609BC48AE775DB16E88439AB7A1F788744F50412ADB8D87B69DF7CC488CF40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 000000018000A7AC: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000180001020), ref: 000000018000A7D5
                                                                                    • Part of subcall function 00000001800562D0: memset.MSVCRT ref: 000000018005630E
                                                                                    • Part of subcall function 00000001800562D0: GetModuleFileNameW.KERNEL32 ref: 0000000180056325
                                                                                    • Part of subcall function 00000001800562D0: PathAppendW.SHLWAPI ref: 0000000180056349
                                                                                    • Part of subcall function 00000001800562D0: _wcsicmp.MSVCRT ref: 0000000180056364
                                                                                    • Part of subcall function 00000001800562D0: PathAppendW.SHLWAPI ref: 000000018005637A
                                                                                  • RegCloseKey.ADVAPI32 ref: 0000000180056B49
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AppendPath$CloseFileHeapModuleNameProcess_wcsicmpmemset
                                                                                  • String ID: 360EntSecurity$360Safe$?$SOFTWARE\$SOFTWARE\Wow6432Node\
                                                                                  • API String ID: 2226481571-3054377637
                                                                                  • Opcode ID: 559c51600a1c84c3d1a9e1e9348cf60bbaa67dd7de1927a7c1e5ea5049295e34
                                                                                  • Instruction ID: 5d79a3dbe08d97a28ec647ffc4188a53122dfd3fad7d09cd3595c12d58dad182
                                                                                  • Opcode Fuzzy Hash: 559c51600a1c84c3d1a9e1e9348cf60bbaa67dd7de1927a7c1e5ea5049295e34
                                                                                  • Instruction Fuzzy Hash: 211261B2701A4886EB419B69C8413DD73A1FB85BF4F448711AA3D977E5DF78CA89C340
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeString$??2@??3@_wtoi
                                                                                  • String ID: //reccfg/wndclass
                                                                                  • API String ID: 1119205991-3779619899
                                                                                  • Opcode ID: 9c78ad74510e5c1aaa63a647f98f978ea0f712cabf314f4090d01513adc07354
                                                                                  • Instruction ID: aac1c87dd54dd223690f6a51cef8bcee3ce48f855a47f00273c96f55abf577db
                                                                                  • Opcode Fuzzy Hash: 9c78ad74510e5c1aaa63a647f98f978ea0f712cabf314f4090d01513adc07354
                                                                                  • Instruction Fuzzy Hash: D5B17A32701E489AEB81CF79C4803DC33A0F749B98F058626EA1E57B98DF38CA59C345
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$htonl$htonsmemmove
                                                                                  • String ID:
                                                                                  • API String ID: 2604728826-0
                                                                                  • Opcode ID: 47040365556197fad99d51432fd7888eae327b64f784180218b7cf6a30f5653d
                                                                                  • Instruction ID: c6a7ef21b5906d6b557d77442a06c91d81bd98b5ee7ca8850e16d0b233cac89c
                                                                                  • Opcode Fuzzy Hash: 47040365556197fad99d51432fd7888eae327b64f784180218b7cf6a30f5653d
                                                                                  • Instruction Fuzzy Hash: 21B15B36704B848AE792CF61F48039EB7B5F748788F518015EE8917A98CF38D65DDB48
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??3@?terminate@@$ErrorExceptionLastThrowmemmove
                                                                                  • String ID:
                                                                                  • API String ID: 223594506-0
                                                                                  • Opcode ID: abe36e33305c97acef1d384f130b573a12daa0eb5c7ec11c20e9a8599c7bd32e
                                                                                  • Instruction ID: fcc32ee8dbcfcc96106fa9aa2d9edb036d58ed735eb2ced8cd8263455d285739
                                                                                  • Opcode Fuzzy Hash: abe36e33305c97acef1d384f130b573a12daa0eb5c7ec11c20e9a8599c7bd32e
                                                                                  • Instruction Fuzzy Hash: 0971E472210B8882EB559F19E8403DE6321FB8DBD4F608611FBAD47B96DF38C699C300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value_errno$HeapProcess_time64
                                                                                  • String ID: %s_count$%s_lasttime$CloudCfg
                                                                                  • API String ID: 2146318826-610660357
                                                                                  • Opcode ID: 391d25aba3b16aa89747ead15b5123f6840dc9e57769fc6a8d330c04b0e76dac
                                                                                  • Instruction ID: 0a7454a278269eadbb0ffce7cefadb2dc21e45630bc3a54506c3f9663c92b6cc
                                                                                  • Opcode Fuzzy Hash: 391d25aba3b16aa89747ead15b5123f6840dc9e57769fc6a8d330c04b0e76dac
                                                                                  • Instruction Fuzzy Hash: DC819572215B4986EB91DB64D4807DE77A0F7887E4F508226FA5E437E9DF38CA48CB40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Global$Stream$??3@CreateFromLockSizeUnlock
                                                                                  • String ID: __Location__
                                                                                  • API String ID: 3539542440-1240413640
                                                                                  • Opcode ID: 258c331e991ad95c783ef0416d4c37d993b248583095014714736d7ddb22313c
                                                                                  • Instruction ID: 0f7485e4f93bbca4fed8cf01455b67f1128db3508264a427a58b068d72c2ae23
                                                                                  • Opcode Fuzzy Hash: 258c331e991ad95c783ef0416d4c37d993b248583095014714736d7ddb22313c
                                                                                  • Instruction Fuzzy Hash: A6818072700A4885EB46DB75D8403DC3761F749BE8F548216EA2E577E5DF34CA89C300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CharNext
                                                                                  • String ID:
                                                                                  • API String ID: 3213498283-0
                                                                                  • Opcode ID: f29f1362136db7183f5f3bb7661024df541b93d863d4b8e8a836a3b8ce17e584
                                                                                  • Instruction ID: 1492bbbb0fb01b81f8d7bc8417cc5d1fdb32638e21ab672acd404a2c35c9a6c4
                                                                                  • Opcode Fuzzy Hash: f29f1362136db7183f5f3bb7661024df541b93d863d4b8e8a836a3b8ce17e584
                                                                                  • Instruction Fuzzy Hash: 5B417236615A9881FBA2CF11D4143A833E0FB5CBD4F44C412EB8A47795EF78C7AA9305
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value$_time64$HeapProcess
                                                                                  • String ID: %s_count$%s_lasttime$CloudCfg
                                                                                  • API String ID: 1319719158-610660357
                                                                                  • Opcode ID: 633e9513b59cb82dbd4c42a8dfc42ca5507bcd6ec68c6f3b38eaf980b99686d7
                                                                                  • Instruction ID: 831a43b99bf02356c207f364941f14581f3732c075b2ce428cfbfee20bf611f1
                                                                                  • Opcode Fuzzy Hash: 633e9513b59cb82dbd4c42a8dfc42ca5507bcd6ec68c6f3b38eaf980b99686d7
                                                                                  • Instruction Fuzzy Hash: 6D416CB2701B4486EB51DB29D84079D37A1FB89BF8F048325AA2E577E5DF38C688C341
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: File$View$CloseCreateFreeHandleMappingUnmapVirtual
                                                                                  • String ID: @
                                                                                  • API String ID: 1610889594-2766056989
                                                                                  • Opcode ID: 9e250b4aa7b62d1553fe35a5f9326120a0ee329e43ca5cceee30773795f05c5d
                                                                                  • Instruction ID: 7e3ec4805bf171649116eeb00cfc7755a40712108081f57de73f5286651d6e8e
                                                                                  • Opcode Fuzzy Hash: 9e250b4aa7b62d1553fe35a5f9326120a0ee329e43ca5cceee30773795f05c5d
                                                                                  • Instruction Fuzzy Hash: AE41E936219B85C2DBA0DB16E49076AB760F7C8B94F505125EB8E83BA9EF7DC444CB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$AppendCloseCreateHandleModuleNamePathReadSizememmove
                                                                                  • String ID: ..\config\msgcenter64.dat
                                                                                  • API String ID: 1552649294-925171115
                                                                                  • Opcode ID: 2b6bc0a9826245997d2484599f869692e6608d281a15ca6de91b59abf58e858d
                                                                                  • Instruction ID: 6037bf8a0cbc718679defd9cfc68d096276397db31603676c3dd85afabd3a34b
                                                                                  • Opcode Fuzzy Hash: 2b6bc0a9826245997d2484599f869692e6608d281a15ca6de91b59abf58e858d
                                                                                  • Instruction Fuzzy Hash: A1316032604B8886E751CF61E8447CDBBA4F389BD4F508115FEA917BA8CF38C64ACB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Path$AppendFilememset$CloseExistsModuleName_wcsicmp
                                                                                  • String ID: safemon\360EDRSensor.exe
                                                                                  • API String ID: 2297386589-1382049097
                                                                                  • Opcode ID: 42f0aba2aa1986b903558ee18fe79d01fe9ddf52126576828c9ac8a665b693b0
                                                                                  • Instruction ID: b56041483c5d1cc8e669a9f5834781a952b0b95e5cd2a6710febed08a80e77bc
                                                                                  • Opcode Fuzzy Hash: 42f0aba2aa1986b903558ee18fe79d01fe9ddf52126576828c9ac8a665b693b0
                                                                                  • Instruction Fuzzy Hash: 44315071724A4886EA91DB24EC9439973A0FB8C7A4F409215B96E436F5EF39C74DC700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Path$AppendFilememset$CloseExistsModuleName_wcsicmp
                                                                                  • String ID: safemon\360ExtHost.exe
                                                                                  • API String ID: 2297386589-1382862812
                                                                                  • Opcode ID: fc9508a032b388f95354c21349e4f50a604572e192d3fc7bf2bb7d329c5c28e2
                                                                                  • Instruction ID: 6ff1a21142ab4c8bd4a0b27ef24c26924cb25d1c518f26ee789ee6da218a3a52
                                                                                  • Opcode Fuzzy Hash: fc9508a032b388f95354c21349e4f50a604572e192d3fc7bf2bb7d329c5c28e2
                                                                                  • Instruction Fuzzy Hash: E7316F71724A4886EBA1DB24EC943997360FB8C7A4F409215B96E836F5DF39C74CCB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressCloseHandleModuleOpenProc
                                                                                  • String ID: Advapi32.dll$RegOpenKeyTransactedW
                                                                                  • API String ID: 823179699-3913318428
                                                                                  • Opcode ID: e5aa230e6d6d73d44fbb0867bef8b98e7cffe5e7cefdcdffa37db2e7ba59e934
                                                                                  • Instruction ID: bf9e62a3942db8529e652a7a00b11324bbad2056b1e05bdd0101147039c14a4a
                                                                                  • Opcode Fuzzy Hash: e5aa230e6d6d73d44fbb0867bef8b98e7cffe5e7cefdcdffa37db2e7ba59e934
                                                                                  • Instruction Fuzzy Hash: E7218E32604B4482EB92DF02F8543A973A0FB8CBD0F088025AED947B54DF3CC659D701
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AcquireContextCriticalCryptSection_time64$EnterErrorLastLeavememsetrandsrand
                                                                                  • String ID:
                                                                                  • API String ID: 1109857607-0
                                                                                  • Opcode ID: 8a34afe03370e941922b9fa1342c3f51188d8ab34ab1c1fde89d7cbfdbbd1467
                                                                                  • Instruction ID: ca70be7a54b7a8b6e3e4f55ca6010b26a0c6ab118fec8c1b3c60b99ca43e49b7
                                                                                  • Opcode Fuzzy Hash: 8a34afe03370e941922b9fa1342c3f51188d8ab34ab1c1fde89d7cbfdbbd1467
                                                                                  • Instruction Fuzzy Hash: 7521A132B10B4482E7559F25E84439C77A5FB99F98F059225DA690BBA5CF38C68AC300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$Free$CloseHandleProcess$ExceptionLockMutexReleaseThrowUnlockWalk
                                                                                  • String ID:
                                                                                  • API String ID: 2337826640-0
                                                                                  • Opcode ID: 5ebd4694b0cf8b1b0e10d1caafe6c046652a29d11f97caa12330084f2d285228
                                                                                  • Instruction ID: 33d5259c6290a7581a5ad5f3dc980324b092c5f168283266ec493f33f9dd72fa
                                                                                  • Opcode Fuzzy Hash: 5ebd4694b0cf8b1b0e10d1caafe6c046652a29d11f97caa12330084f2d285228
                                                                                  • Instruction Fuzzy Hash: BB111632601A49CAEB869F21EC543E82360FB4CBD5F19D525BA190B6A5DF34C75DC340
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeString
                                                                                  • String ID:
                                                                                  • API String ID: 3341692771-0
                                                                                  • Opcode ID: 73e3a869f78964b23eaffc721e09444bf3a0d7b676e7666a508320a6b867a5bd
                                                                                  • Instruction ID: c87333ac7bcb44b69379473da2adcf9225e28ba0b3bfb3a3c4204cf647e2c29f
                                                                                  • Opcode Fuzzy Hash: 73e3a869f78964b23eaffc721e09444bf3a0d7b676e7666a508320a6b867a5bd
                                                                                  • Instruction Fuzzy Hash: B5110337612B08C6FB96DF64D8583682360FB5DFA9F258704DA6B49599CF38C64DC340
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseControlCreateCurrentDeviceFileHandleProcess
                                                                                  • String ID: L "$\\.\360SelfProtection
                                                                                  • API String ID: 3778458602-907869749
                                                                                  • Opcode ID: e256c9444f2bf81226e555b6f7292d8a7bd12b46bc34df817c0f54cce6c08caa
                                                                                  • Instruction ID: 4989c80b025c73f727db9230e342af37d309858987cbaecb77f10a65d22bbdba
                                                                                  • Opcode Fuzzy Hash: e256c9444f2bf81226e555b6f7292d8a7bd12b46bc34df817c0f54cce6c08caa
                                                                                  • Instruction Fuzzy Hash: F6111C32618B84D7C7518F64F88478AB7A0F78C7A4F444725E6AA43B68EF78C65CCB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$??3@
                                                                                  • String ID:
                                                                                  • API String ID: 652292005-0
                                                                                  • Opcode ID: d5eaac9880b29e7d0af136669fdebebd909549339380b54f119e65074af5ce41
                                                                                  • Instruction ID: 16cab60fb696caa1ac382d07db4514fcd7f2788f0d4e97422f2d8c76aa010f09
                                                                                  • Opcode Fuzzy Hash: d5eaac9880b29e7d0af136669fdebebd909549339380b54f119e65074af5ce41
                                                                                  • Instruction Fuzzy Hash: 95C14A32B00B449AEB61CFA1E8407DD33B6F748798F548125EE9967B98DF34C62AD344
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: wcsstr$_errnomemmove
                                                                                  • String ID:
                                                                                  • API String ID: 3323953840-0
                                                                                  • Opcode ID: 251354a66c982ebe395b5198ba1b60466afa3abfe6d2f318c4ac3c1dc85cfacb
                                                                                  • Instruction ID: 824f22201ec0d57d4a2227744580b71807502b4fbd2fda829f419a9b6e1dff6e
                                                                                  • Opcode Fuzzy Hash: 251354a66c982ebe395b5198ba1b60466afa3abfe6d2f318c4ac3c1dc85cfacb
                                                                                  • Instruction Fuzzy Hash: CF810572701A4881EAA6DB14A4447AE77A0FB4CBE4F15C215FFAE4B7D4DE38C6498704
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Deinstall$ProviderProvider32$CleanupStartup
                                                                                  • String ID:
                                                                                  • API String ID: 348239931-0
                                                                                  • Opcode ID: 4fc830036e70fcdad210563e15636e8950cfeeae8d6d629c7bbfe77b3d9d1d9b
                                                                                  • Instruction ID: c360e4d789f3669f84b45de69cf2c2640493478b51e108b497c61621dba60db4
                                                                                  • Opcode Fuzzy Hash: 4fc830036e70fcdad210563e15636e8950cfeeae8d6d629c7bbfe77b3d9d1d9b
                                                                                  • Instruction Fuzzy Hash: 48910332604A88C6EB92CB65E4547EE77A4F78C7E4F618111FA8D276A4DF39C649CB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: String$??3@Free$??2@AllocHeapProcess
                                                                                  • String ID:
                                                                                  • API String ID: 195827-0
                                                                                  • Opcode ID: a0ac78459233da017ac87d6453e8a81be7370a52e333d62a5881ff707d93bed7
                                                                                  • Instruction ID: 472ff7a9124bb4c66568a88574ce92508997c8508967d0cb70e73e2f7ddd2399
                                                                                  • Opcode Fuzzy Hash: a0ac78459233da017ac87d6453e8a81be7370a52e333d62a5881ff707d93bed7
                                                                                  • Instruction Fuzzy Hash: B951BD32701A4886EB46DF65D8403AD73B0FB49BE4F098621EB2957BE9DF38C959C340
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: String$??3@Free$??2@AllocHeapProcess
                                                                                  • String ID:
                                                                                  • API String ID: 195827-0
                                                                                  • Opcode ID: ceda01c74325736d26a0411a727c02681ceb51477494a67f089079f3182e5468
                                                                                  • Instruction ID: d6e040c62356dd28a52f4054929385a923e12d2376c870478276763e31a13ced
                                                                                  • Opcode Fuzzy Hash: ceda01c74325736d26a0411a727c02681ceb51477494a67f089079f3182e5468
                                                                                  • Instruction Fuzzy Hash: 9D516F33701B4982EB469F65D85039E63A0FB89FA4F498221EB295B7D9DF38C549C340
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: String$??3@Free$??2@AllocHeapProcess
                                                                                  • String ID:
                                                                                  • API String ID: 195827-0
                                                                                  • Opcode ID: 1487f1b9042455cadd1f594916249c517a85c0241772127b20d59336a7db92ce
                                                                                  • Instruction ID: b9a7bc9aefba1d0cd95c21a72bfdce90d94dfcaa7ac1bda6bd9d80d9113677c1
                                                                                  • Opcode Fuzzy Hash: 1487f1b9042455cadd1f594916249c517a85c0241772127b20d59336a7db92ce
                                                                                  • Instruction Fuzzy Hash: 55516032701B4882EB469F65D85039E73A0FB49FE4F098625EB69577D9DF38C649C380
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: String$??3@Free$AttributesFile$??2@AllocHeapProcess
                                                                                  • String ID:
                                                                                  • API String ID: 2343307612-0
                                                                                  • Opcode ID: 8e393e3a3852b3cedc11bf39ea6ffb031ff90eabb787ce897587cb6f9badf564
                                                                                  • Instruction ID: 3edc698dfee31cca13762dbc840380725e1013da3230f8d99093220343b8c6e9
                                                                                  • Opcode Fuzzy Hash: 8e393e3a3852b3cedc11bf39ea6ffb031ff90eabb787ce897587cb6f9badf564
                                                                                  • Instruction Fuzzy Hash: 21515F32701B4882EB46DF65D85039D73A0FB49FA4F098225EB695B7E9DF38C949C380
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: lstrcmpimemset
                                                                                  • String ID: ShellEx\IconHandler$\DefaultIcon$clsid\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\${42042206-2D85-11D3-8CFF-005004838597}
                                                                                  • API String ID: 3784069311-1340094651
                                                                                  • Opcode ID: 0a12214a811aa3540a0b94e6fb55089740eaeb8575e012286690255a8f8d330d
                                                                                  • Instruction ID: 9f0af0b831dc55336fcff299f0060eabbe44d87f67dffe850d980bb31fffbbb0
                                                                                  • Opcode Fuzzy Hash: 0a12214a811aa3540a0b94e6fb55089740eaeb8575e012286690255a8f8d330d
                                                                                  • Instruction Fuzzy Hash: 0251A672601E4982EB52DB29D8817DE6760FB897F4F508312FA6D436E5DF38C689C740
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$EnterEnvironmentExpandLeaveStrings
                                                                                  • String ID:
                                                                                  • API String ID: 3103530258-0
                                                                                  • Opcode ID: 4711d94ae21e721216315d7d413d31c061a842b8496e77f250252f344626d692
                                                                                  • Instruction ID: b0c21a69e9994dd49745b429a24057b93f4d6bf7018e4c24e81fb4468a7e2a6c
                                                                                  • Opcode Fuzzy Hash: 4711d94ae21e721216315d7d413d31c061a842b8496e77f250252f344626d692
                                                                                  • Instruction Fuzzy Hash: 0051AF32711A4882EB82CF29D8843DE7761F789BE8F549211FE69176A5DF39C64AC700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpenQueryValuewcsstr
                                                                                  • String ID: "%s" %s$/elevated
                                                                                  • API String ID: 1248106594-1382985213
                                                                                  • Opcode ID: 7d994b47a6feae35010406933b82370a9ece06ded3bcb5ee78e307a99859ddb1
                                                                                  • Instruction ID: f3329ece6a2879d43efc8f52936060a6c90d44f89bf07b9cf1bbe3f09b4200fa
                                                                                  • Opcode Fuzzy Hash: 7d994b47a6feae35010406933b82370a9ece06ded3bcb5ee78e307a99859ddb1
                                                                                  • Instruction Fuzzy Hash: E241A432702B4489EB95CF65D8407DC33A5FB88BD4F15861AAE5E53BA4DF34C659C340
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: OpenQueryValuememset
                                                                                  • String ID: ExpirationDate$IssueDate$Operator$SOFTWARE\360MachineSignature$SignData
                                                                                  • API String ID: 733315865-1479031278
                                                                                  • Opcode ID: 024b379d581b3895d461dc1fafaaa22704cd15f8aacd44fa0de35045f287b812
                                                                                  • Instruction ID: ca32e24e8d646fa6672ed224415891838e44a9bb2fa0ab3c5403e0472a1cb0df
                                                                                  • Opcode Fuzzy Hash: 024b379d581b3895d461dc1fafaaa22704cd15f8aacd44fa0de35045f287b812
                                                                                  • Instruction Fuzzy Hash: DA411972B00B149AFB92DBA5D8447DD73B5BB487C8F148A16AE6853B58EF34C708CB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$CleanupEnterErrorInstallLastLeaveNameSpaceStartupmemset
                                                                                  • String ID:
                                                                                  • API String ID: 3860525367-0
                                                                                  • Opcode ID: 566063b2480ce26a8a1017dda99dddd59a3f866f59b7cd308274edefec3830af
                                                                                  • Instruction ID: 37d746e663b56e28a6a3e394405e8b675d481f719bc3bdb0db42ce8d24bf20fd
                                                                                  • Opcode Fuzzy Hash: 566063b2480ce26a8a1017dda99dddd59a3f866f59b7cd308274edefec3830af
                                                                                  • Instruction Fuzzy Hash: 57316E31700A4886F6A29F25EC443E973A0FB8DBD5F548531B96A972A1DF39C7898700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Size$CloseCreateHandleRead
                                                                                  • String ID:
                                                                                  • API String ID: 1601809017-0
                                                                                  • Opcode ID: 6c38b284369adc8e8a95ca7bd81b2def578c31ecd07c0865210070f76e2fb98a
                                                                                  • Instruction ID: 513f97a3dac13d024bc23301dce07c49bc5a225dcf8c593d0dc48b4e525c804c
                                                                                  • Opcode Fuzzy Hash: 6c38b284369adc8e8a95ca7bd81b2def578c31ecd07c0865210070f76e2fb98a
                                                                                  • Instruction Fuzzy Hash: 2E21803260475487E7819F2AE8443997BA1F788FD0F658225EF6547BA4DF38C64ACB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??2@$??3@
                                                                                  • String ID: Catalog_Entries$Num_Catalog_Entries
                                                                                  • API String ID: 1245774677-781996053
                                                                                  • Opcode ID: 6b8a8c89c4b699f957cd55a4368444c75396a5c1355a13cca8d488b9109841c6
                                                                                  • Instruction ID: 9fcea3ce77e1ed4f5330bab62f44b4aa9bf918aefdaa2edac95f8aa4354510da
                                                                                  • Opcode Fuzzy Hash: 6b8a8c89c4b699f957cd55a4368444c75396a5c1355a13cca8d488b9109841c6
                                                                                  • Instruction Fuzzy Hash: E6C14132205F8481DAA1CF15F98039EB3A4F789BE4F598625EAED47B98CF38C155C744
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??2@??3@
                                                                                  • String ID: Catalog_Entries$Num_Catalog_Entries
                                                                                  • API String ID: 1936579350-781996053
                                                                                  • Opcode ID: 37b5463f15d82ba4b2fcb730a9bc1d4a2b4fab43a6711b8c84a700227f9107d3
                                                                                  • Instruction ID: d1be57a1d71c98b0b77dd863bddb056ffd98aca7a61043883bc55f1bcd24f70e
                                                                                  • Opcode Fuzzy Hash: 37b5463f15d82ba4b2fcb730a9bc1d4a2b4fab43a6711b8c84a700227f9107d3
                                                                                  • Instruction Fuzzy Hash: 46A1CB72B01F5882EA55DF25D98439C33A4E708BF8F1A8315EA68477E4EF34C69AC345
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • EnterCriticalSection.KERNEL32(?,?,?,?,00000040,?,000000018001107F), ref: 000000018004048F
                                                                                  • LeaveCriticalSection.KERNEL32(?,?,?,?,00000040,?,000000018001107F), ref: 00000001800404A5
                                                                                  • LeaveCriticalSection.KERNEL32(?,?,?,?,00000040,?,000000018001107F), ref: 00000001800404DD
                                                                                  • EnterCriticalSection.KERNEL32(?,?,?,?,00000040,?,000000018001107F), ref: 0000000180040553
                                                                                  • LeaveCriticalSection.KERNEL32(?,?,?,?,00000040,?,000000018001107F), ref: 0000000180040569
                                                                                  • LeaveCriticalSection.KERNEL32(?,?,?,?,00000040,?,000000018001107F), ref: 00000001800405A1
                                                                                  • Sleep.KERNEL32(?,?,?,?,00000040,?,000000018001107F), ref: 000000018004061C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$Leave$Enter$Sleep
                                                                                  • String ID:
                                                                                  • API String ID: 950586405-0
                                                                                  • Opcode ID: 5fd251fa728f84f380744b40e651b61ba74c7f1c4af02f91f8a7010bdfac5f08
                                                                                  • Instruction ID: e5e3152c6d786b815c8bb063f8079f541e8d353448f2aaa10215c0b82b1e43f2
                                                                                  • Opcode Fuzzy Hash: 5fd251fa728f84f380744b40e651b61ba74c7f1c4af02f91f8a7010bdfac5f08
                                                                                  • Instruction Fuzzy Hash: E8618C31301A4892FAD69B21EC943DA23A4F78DBE9F66C515ED6A572A1CF38C74DC700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCreateValue
                                                                                  • String ID: 360scan
                                                                                  • API String ID: 1818849710-2450673717
                                                                                  • Opcode ID: 5bf155bf79df099cab00ad323e7c5f0b1ac545c6889d31c6f531c87adec6c7e2
                                                                                  • Instruction ID: 36ede12e68d324247f48980037de7b94a87db2de9e86c0014956a12bc0703eb2
                                                                                  • Opcode Fuzzy Hash: 5bf155bf79df099cab00ad323e7c5f0b1ac545c6889d31c6f531c87adec6c7e2
                                                                                  • Instruction Fuzzy Hash: 4341B132714B9885F7928B75D8503DC2B70BB8CBE8F549215EEA953BA5DF78C24AC300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressCreateHandleModuleProc
                                                                                  • String ID: Advapi32.dll$RegCreateKeyTransactedW
                                                                                  • API String ID: 1964897782-2994018265
                                                                                  • Opcode ID: ad3fb016844a3b870c46d04542df6f296797cd153b096fbf22ac7f30fc2e7ae0
                                                                                  • Instruction ID: ad22b3d90bad73cc844585d5212e8c39d9a41fcfaef769d6902fd1eabb8e997b
                                                                                  • Opcode Fuzzy Hash: ad3fb016844a3b870c46d04542df6f296797cd153b096fbf22ac7f30fc2e7ae0
                                                                                  • Instruction Fuzzy Hash: 77210C32619B8482EBA1CB55F8547AAB7A0F7C8BD4F149115EACD07B68CF7CC248CB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AppendFileModuleNamePathmemset
                                                                                  • String ID: ..\Config\cloudcfg.dat$cloudcfg.dat
                                                                                  • API String ID: 1620117007-2349577946
                                                                                  • Opcode ID: 1df7031f83b1f1459874d000a77c3faa375f56ebc32878d2fd44ce6dffecdc51
                                                                                  • Instruction ID: ddd92409ecb0ccec80f2ab3f904b9d803dc2e3fbc70a3a57e8900bd834cf0119
                                                                                  • Opcode Fuzzy Hash: 1df7031f83b1f1459874d000a77c3faa375f56ebc32878d2fd44ce6dffecdc51
                                                                                  • Instruction Fuzzy Hash: DD216F71204A8881EA91DB11E8443DE7360F78ABD9F90C211FA9947AE9DF7DC74DCB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                  • API String ID: 4061214504-1276376045
                                                                                  • Opcode ID: c2f829957779a5f3283623a795060286876ebd1f64ff5d399dec1781f672f9f2
                                                                                  • Instruction ID: e395451e8db6c2212d1c7d058d3e5d590d561a96988dee0adbc21a3ed47a46ec
                                                                                  • Opcode Fuzzy Hash: c2f829957779a5f3283623a795060286876ebd1f64ff5d399dec1781f672f9f2
                                                                                  • Instruction Fuzzy Hash: 3CF0903120070491EEA28B64A84439A2360FB8C7E1F548619E67A4A2F4CF3DC34DC300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$??3@EnterLeave
                                                                                  • String ID:
                                                                                  • API String ID: 3906572401-0
                                                                                  • Opcode ID: 8704770b73637da07f2765808fbc5d80e4dde8a3e535cddf5f679fa9373d9d11
                                                                                  • Instruction ID: 485792f3aa206c277c5c0904b00aba5ea33dd2ed139350c249341fca4c3fabed
                                                                                  • Opcode Fuzzy Hash: 8704770b73637da07f2765808fbc5d80e4dde8a3e535cddf5f679fa9373d9d11
                                                                                  • Instruction Fuzzy Hash: 5CB15732B05B448AEB51CFA0A8407DD33F5F748798F144526EE9867B88DF34C65AD354
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Process32wsprintf$CreateFirstNextSnapshotToolhelp32
                                                                                  • String ID:
                                                                                  • API String ID: 4137211488-0
                                                                                  • Opcode ID: 5ae15c8b8c9fac1bc2260a3d73dec5e15d910bbb577535e29febeca4dfee412a
                                                                                  • Instruction ID: c382ee8f2556739568dfc6b235a106d3b4cd57f30fa34ade9701d4e8adcc3f0f
                                                                                  • Opcode Fuzzy Hash: 5ae15c8b8c9fac1bc2260a3d73dec5e15d910bbb577535e29febeca4dfee412a
                                                                                  • Instruction Fuzzy Hash: 4391F876619BC1E6DA60DB15E48039AB7A5F7D8384F900225EBCD43B68EF78C546CF40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: _errno
                                                                                  • String ID:
                                                                                  • API String ID: 2918714741-0
                                                                                  • Opcode ID: 8b2e5358ef7994b7672dda4e212676a9332a6cdbfea30cd8ee4f2d86f2200a94
                                                                                  • Instruction ID: 273587a47ae5326c80e6ba55da8392b357747b6508265d18e5e13f97f53468fd
                                                                                  • Opcode Fuzzy Hash: 8b2e5358ef7994b7672dda4e212676a9332a6cdbfea30cd8ee4f2d86f2200a94
                                                                                  • Instruction Fuzzy Hash: 7471A572204B88CAE7AA8F19A4403EE77A4FB887D4F148115FE9947BD4DF3AC604C700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ba1b7d8a54ca9e61b32243bdca9827d2af31baf2e5ee2aa88a178ea20bd3cca5
                                                                                  • Instruction ID: 419d1cd18973d3b13d39a4ceb472edd046808d52e61f51e035053bf17ea67cb2
                                                                                  • Opcode Fuzzy Hash: ba1b7d8a54ca9e61b32243bdca9827d2af31baf2e5ee2aa88a178ea20bd3cca5
                                                                                  • Instruction Fuzzy Hash: 38810A72219B8595DB61EB11F49139AB3A0FBD5384F901426EBCE43A78EF7CC649CB40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: HttpRequest$OpenSend$InternetOption
                                                                                  • String ID:
                                                                                  • API String ID: 664753792-0
                                                                                  • Opcode ID: 7ca2387c2bbf1a7d28999812ac2f6f2864370cd4003b28c3ab5a0417524daa68
                                                                                  • Instruction ID: c3845d65c315092e6188af00eb253e13d5317f593431812fa0d2b4dc10842f3e
                                                                                  • Opcode Fuzzy Hash: 7ca2387c2bbf1a7d28999812ac2f6f2864370cd4003b28c3ab5a0417524daa68
                                                                                  • Instruction Fuzzy Hash: B161C276609B80C6EB61CB15F49439AB7A1F399784F60052AEBC943B68EF7DC548CF40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??2@memmove$??3@
                                                                                  • String ID:
                                                                                  • API String ID: 232491532-0
                                                                                  • Opcode ID: 36aecff153c17e78cc281762afab7df910fd19be64e25fb5c31b0b5d4ec441f6
                                                                                  • Instruction ID: 28467c757ab6f7ef32b6ddf95ff48fc265dfbbceda238bfa6dff49904db51385
                                                                                  • Opcode Fuzzy Hash: 36aecff153c17e78cc281762afab7df910fd19be64e25fb5c31b0b5d4ec441f6
                                                                                  • Instruction Fuzzy Hash: 0C41C432B05B8881EF568B16F9403996361E748BE0F548725AB7A07BE9DF78C6958340
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • _swprintf_c_l.LIBCMT ref: 000000018006A6B0
                                                                                  • memmove.MSVCRT(00000000,00000008,00000000,000000018006AA37,?,?,?,?,?,?,?,?,?,?,00000003,?), ref: 000000018006A6DB
                                                                                  • memmove.MSVCRT(00000000,00000008,00000000,000000018006AA37,?,?,?,?,?,?,?,?,?,?,00000003,?), ref: 000000018006A755
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: memmove$_swprintf_c_l
                                                                                  • String ID:
                                                                                  • API String ID: 3930809162-0
                                                                                  • Opcode ID: 4d957fd311e85dbc9e9e1d2fcdfd49009c8516e907acacc0d6bfdbff04455b87
                                                                                  • Instruction ID: 2e3324a3b5d682f35c297bfefc02d538748b26edc97be9d81ac6111acbd6bae8
                                                                                  • Opcode Fuzzy Hash: 4d957fd311e85dbc9e9e1d2fcdfd49009c8516e907acacc0d6bfdbff04455b87
                                                                                  • Instruction Fuzzy Hash: 0A41E33231875496EBA5DA26D90079A67A2BB4DBC0F248015AF1A43F41DE35D6688B40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$Leave$Enter
                                                                                  • String ID:
                                                                                  • API String ID: 2978645861-0
                                                                                  • Opcode ID: 84f7991fb58de1b865a10277cce647e74e53e0d7bb9d3c9fb8eb0733b83dca90
                                                                                  • Instruction ID: 73bd4c9cd9396375e0c1b942217bf14bfc10cb3082dae23d56ea31479293823c
                                                                                  • Opcode Fuzzy Hash: 84f7991fb58de1b865a10277cce647e74e53e0d7bb9d3c9fb8eb0733b83dca90
                                                                                  • Instruction Fuzzy Hash: 19413932641B0896FA869F21EC943E83764F749FD9F598115EAA50B3A5CF28C74EC304
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??2@memmove$??3@
                                                                                  • String ID:
                                                                                  • API String ID: 232491532-0
                                                                                  • Opcode ID: 4c8a09d1fefffe74558815fc45e4f8bd62bc61723e2fbaaf498aee53098e704a
                                                                                  • Instruction ID: 3308181ea52ff5a0dd97f5d36b69886329373971ad435e2f25c4df82c4de258d
                                                                                  • Opcode Fuzzy Hash: 4c8a09d1fefffe74558815fc45e4f8bd62bc61723e2fbaaf498aee53098e704a
                                                                                  • Instruction Fuzzy Hash: 8231D332705B8894EF5ACF16D9443986362F709FE0F588615EE6E07BE6DE78D299C300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • memmove.MSVCRT(?,?,?,7FFFFFFFFFFFFFFF,?,?,?,?,?,?,000000C8,0000000180015AD6), ref: 0000000180016298
                                                                                  • memmove.MSVCRT(?,?,?,7FFFFFFFFFFFFFFF,?,?,?,?,?,?,000000C8,0000000180015AD6), ref: 00000001800162A6
                                                                                  • ??3@YAXPEAX@Z.MSVCRT ref: 00000001800162DE
                                                                                  • memmove.MSVCRT(?,?,?,7FFFFFFFFFFFFFFF,?,?,?,?,?,?,000000C8,0000000180015AD6), ref: 00000001800162E8
                                                                                  • memmove.MSVCRT(?,?,?,7FFFFFFFFFFFFFFF,?,?,?,?,?,?,000000C8,0000000180015AD6), ref: 00000001800162F6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: memmove$??3@
                                                                                  • String ID:
                                                                                  • API String ID: 2321372689-0
                                                                                  • Opcode ID: 2a291cfa02ae191c963c7aa5d4289e2a243c3539a711814b18b996a7d7b87c53
                                                                                  • Instruction ID: b2b38ff55e60cbfe57fc328909b4bad170525be2db7207aa5bf6da73de3f6202
                                                                                  • Opcode Fuzzy Hash: 2a291cfa02ae191c963c7aa5d4289e2a243c3539a711814b18b996a7d7b87c53
                                                                                  • Instruction Fuzzy Hash: 7831D272700A8891DB569F12E9043DE6351F748FD0F948522EF5E4BBA6DE3CC259C300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Internet$CloseHandleOpen
                                                                                  • String ID:
                                                                                  • API String ID: 435140893-0
                                                                                  • Opcode ID: 1ae38b70c00e5fa2b0baae9672864dfc4ebc490b6e9ea35561f34b789a8602ec
                                                                                  • Instruction ID: 04ae8cdf1a4bf5558470f693f9f04813b8f4ddb50aa274acdc713fe0db26dbe8
                                                                                  • Opcode Fuzzy Hash: 1ae38b70c00e5fa2b0baae9672864dfc4ebc490b6e9ea35561f34b789a8602ec
                                                                                  • Instruction Fuzzy Hash: 4441DF76229B8086D760CB19F49471AB7A1F3C9B84F505429FB8A83B68DF7DC854CF04
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: memmove$??3@
                                                                                  • String ID:
                                                                                  • API String ID: 2321372689-0
                                                                                  • Opcode ID: d7a3fd22b0ebd3110ce60677b93657e49589d130bcba2fb1c65b72589847b85a
                                                                                  • Instruction ID: 762f5997fa826d969e67cf094c143b4ceaf1448be14793aa958531d929a095e6
                                                                                  • Opcode Fuzzy Hash: d7a3fd22b0ebd3110ce60677b93657e49589d130bcba2fb1c65b72589847b85a
                                                                                  • Instruction Fuzzy Hash: 8231A172300E9885D94AEE5286843DCA765F74DFD4F66C521BF680BB96CE38D24AC304
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$AncestorFromPointRectmemset
                                                                                  • String ID:
                                                                                  • API String ID: 3039914759-0
                                                                                  • Opcode ID: fc34e6d246657f66188d6f8573fbe65fb936fbcf3c4029c0371e48d01d16a740
                                                                                  • Instruction ID: 06be680ac09e87041cb82e4d3d0d5ca659cc845397dc933fd24aa54eca265516
                                                                                  • Opcode Fuzzy Hash: fc34e6d246657f66188d6f8573fbe65fb936fbcf3c4029c0371e48d01d16a740
                                                                                  • Instruction Fuzzy Hash: 1931CD32615A4486F7E28F25DC487DA63A4FB8C7C4F449020FE5977694EF39CA99D700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: _errnoiswspace$memmove
                                                                                  • String ID:
                                                                                  • API String ID: 972559988-0
                                                                                  • Opcode ID: 62484f1315cc315bf352517e41dc366093ff24740a399b805c186dd2600ce3b7
                                                                                  • Instruction ID: aea15859d9ef88290176a7c9cabebc096ef147a52e12ca1286494642d1a9418c
                                                                                  • Opcode Fuzzy Hash: 62484f1315cc315bf352517e41dc366093ff24740a399b805c186dd2600ce3b7
                                                                                  • Instruction Fuzzy Hash: 3531CBB3601A4886EB99DF54D9847ED33A0F788BC0F18C019EB4A0B792DF3DDA588744
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446779994.0000000000130000.00000040.00001000.00020000.00000000.sdmp, Offset: 00130000, based on PE: true
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_130000_rundll32.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseHandlewsprintf$CreateProcess
                                                                                  • String ID:
                                                                                  • API String ID: 2803068115-0
                                                                                  • Opcode ID: 8938f75853ead479109948e0102cad3cc37345a1e7db50e04927b10cccad6238
                                                                                  • Instruction ID: da12eb9c82cd0421016ec6dea64d8c1b4b2fd8c64bbe910e4aa6c8da0b3c0fd4
                                                                                  • Opcode Fuzzy Hash: 8938f75853ead479109948e0102cad3cc37345a1e7db50e04927b10cccad6238
                                                                                  • Instruction Fuzzy Hash: 1941F272208BC196DB60DB15F48039AB7A1F7D8384F804426EBCA83A68EF7CC559CB40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??3@$CriticalSection$Delete$EnterLeave
                                                                                  • String ID:
                                                                                  • API String ID: 274858031-0
                                                                                  • Opcode ID: a29c501b7cb5b62190f2ee82e18e93e4c2b49ef20e282c724fca1469eff036db
                                                                                  • Instruction ID: d11087617417198f0cbd7eb66d5c9be171642f9dfb033e604718f16c8d919299
                                                                                  • Opcode Fuzzy Hash: a29c501b7cb5b62190f2ee82e18e93e4c2b49ef20e282c724fca1469eff036db
                                                                                  • Instruction Fuzzy Hash: 49312A36201E88A2EB569F64E4913DDA360F7897D0F54C522EB9D437A1DF78DAA9C300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: _errno
                                                                                  • String ID:
                                                                                  • API String ID: 2918714741-0
                                                                                  • Opcode ID: ef9a1a2487f9f747f790f9b6156918c71975c41e3d5b8d109555e51fa42619a5
                                                                                  • Instruction ID: a73d7fb5a67d4d67bba371cf0b3796608c1c1b370b7326418a0f08ed132aa8b6
                                                                                  • Opcode Fuzzy Hash: ef9a1a2487f9f747f790f9b6156918c71975c41e3d5b8d109555e51fa42619a5
                                                                                  • Instruction Fuzzy Hash: D411E03270468881EAE66B25B1403DE63D0E7487E0F09A226FBAA1B7C5CE3DD5D79714
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: _errno
                                                                                  • String ID:
                                                                                  • API String ID: 2918714741-0
                                                                                  • Opcode ID: c89821886ccf670e100f3b8fb91d8e831a6b96267fb5c2ba29df3964e1113532
                                                                                  • Instruction ID: ac3a4cfa431d0ef0eaea2260b684207aebe75cd91c02b4061f0f196fb58aac9a
                                                                                  • Opcode Fuzzy Hash: c89821886ccf670e100f3b8fb91d8e831a6b96267fb5c2ba29df3964e1113532
                                                                                  • Instruction Fuzzy Hash: 2611013270878881EAEA6B25B2403DE6391E7487D0F08A125BBAA0B3C5DE3DD5979304
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??2@$??3@
                                                                                  • String ID: %s\NameSpace_Catalog5\Catalog_Entries\%012d
                                                                                  • API String ID: 1245774677-2131870787
                                                                                  • Opcode ID: af5baddc67ad33526a33c39d65950fd72fb0df208da0cc0d422425bada8017cf
                                                                                  • Instruction ID: 67395956b14f0255dc157d00751ecdd5e79b91100998fde5bc7e771f553c8d3c
                                                                                  • Opcode Fuzzy Hash: af5baddc67ad33526a33c39d65950fd72fb0df208da0cc0d422425bada8017cf
                                                                                  • Instruction Fuzzy Hash: 5C81AFB3700B4882DE65CF15E8447E9A3A5F749BD4F54C222BA9D1B794EF7AD289C300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??2@$??3@
                                                                                  • String ID: %s\NameSpace_Catalog5\Catalog_Entries\%012d
                                                                                  • API String ID: 1245774677-2131870787
                                                                                  • Opcode ID: dfcd8af31725850ee712bb16f67c2dba61d9d14ccc8acf01942b48f66b795e08
                                                                                  • Instruction ID: ceb8e503b58a09837b0f64c0a513370a87b020a4d694bdf072cc47396662b60f
                                                                                  • Opcode Fuzzy Hash: dfcd8af31725850ee712bb16f67c2dba61d9d14ccc8acf01942b48f66b795e08
                                                                                  • Instruction Fuzzy Hash: 8251C47371579C82EE59CB16E5143EA6364B34DBD4F108626BEAD1BBC4DF39C2558300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Time$FileMutexReleaseSystem
                                                                                  • String ID: %I64d$__LastModified__
                                                                                  • API String ID: 4233779698-1650611527
                                                                                  • Opcode ID: 3e8cf2df84acdc051a18ea2821a1bd380114409e3e0b0fa2bea459e4e782fd62
                                                                                  • Instruction ID: 09458c959511dc8cfabe6624f5c81a29e97a68172d7e622df1c6d3cc80163a48
                                                                                  • Opcode Fuzzy Hash: 3e8cf2df84acdc051a18ea2821a1bd380114409e3e0b0fa2bea459e4e782fd62
                                                                                  • Instruction Fuzzy Hash: FF518D72610A0986EB96DB39C8507ED33A0FB49BE8F448321BE3A476E5DF24C649C341
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: HeapProcessString_vsnwprintf_smemset
                                                                                  • String ID: com$error_code
                                                                                  • API String ID: 3912638396-1490343999
                                                                                  • Opcode ID: c3fc6b550fc0518e05701da538a0c891b20461f4f7683d40c3e05c31526f994e
                                                                                  • Instruction ID: a6db5d25ead79d5040835bfd854280f02b38994ac018b834727960b236b5b414
                                                                                  • Opcode Fuzzy Hash: c3fc6b550fc0518e05701da538a0c891b20461f4f7683d40c3e05c31526f994e
                                                                                  • Instruction Fuzzy Hash: E351D772601D4995EB82DB25D8803DE2360FB88BD8F55C212FE2D476E9DF34CA49C740
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CountCriticalErrorInitializeLastSectionSpinmemset
                                                                                  • String ID: http://%s/wcheckquery
                                                                                  • API String ID: 1980634866-481256882
                                                                                  • Opcode ID: e44517d9abee306bf729d9c1b39ec77439867e7632e0484d40de2573647f887c
                                                                                  • Instruction ID: d06bd9b14ce5bf28a863698d63a9b65a52eeb4a283bf68ad799e7df679026a35
                                                                                  • Opcode Fuzzy Hash: e44517d9abee306bf729d9c1b39ec77439867e7632e0484d40de2573647f887c
                                                                                  • Instruction Fuzzy Hash: 0841A032601B4996E7A2CF64E8403DA73E4F788BA4F548125EF8957794EF3CC659C350
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressErrorLastProcSleep
                                                                                  • String ID: InitOnceExecuteOnce
                                                                                  • API String ID: 299661913-4081768745
                                                                                  • Opcode ID: 094ff7c6e7223ac0c25a3f196aef8d97d885558a79827bf00b4784aca917e5fd
                                                                                  • Instruction ID: d97429db02a29b97f0d7b061f75759de830bcf77ba77d21ec7224c84f46128ac
                                                                                  • Opcode Fuzzy Hash: 094ff7c6e7223ac0c25a3f196aef8d97d885558a79827bf00b4784aca917e5fd
                                                                                  • Instruction Fuzzy Hash: 4331C63131175881FBDA8B65AC103A92294BB4DBE4F44C225FE6A9B7D4DF3DCA4A8300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: emc$mpt$nct
                                                                                  • API String ID: 0-4018135154
                                                                                  • Opcode ID: de2908332be039851882f27ba843e54a0a4e6a129764ff773922d891e26d8285
                                                                                  • Instruction ID: 4437dbb73dbe2b615a95de1095330fd5d3d5a6b349df20e8dd5e5932057711ae
                                                                                  • Opcode Fuzzy Hash: de2908332be039851882f27ba843e54a0a4e6a129764ff773922d891e26d8285
                                                                                  • Instruction Fuzzy Hash: 00416872200B499AEB82DF71D8403DA37B0F3587D8F858912FA28976A9DF34C659C790
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProc
                                                                                  • String ID: NTDLL.DLL$ZwSetInformationThread
                                                                                  • API String ID: 1646373207-2735485441
                                                                                  • Opcode ID: 42bcdad47f616cafdcd5b405ab44a7d36b4e0dac125c8dcdc21394efa803f9cc
                                                                                  • Instruction ID: b89890f0d555bdc3e142d7496d6436052e72b1d505dadace56c849a3f497b7c1
                                                                                  • Opcode Fuzzy Hash: 42bcdad47f616cafdcd5b405ab44a7d36b4e0dac125c8dcdc21394efa803f9cc
                                                                                  • Instruction Fuzzy Hash: 10315472A04B8886E6829B24D5017E86760FB987C4F05E625FF5D62293EF35E7CCC311
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: MutexRelease
                                                                                  • String ID: DELETE FROM 'MT'$select * from sqlite_sequence;$update sqlite_sequence set seq = 0 where name='MT';
                                                                                  • API String ID: 1638419-14785165
                                                                                  • Opcode ID: 881e86d389d9cefced57cf04117e8820d9d165fbcb2647cbb323e1f898b7160a
                                                                                  • Instruction ID: 2735ef6a2105b6c033439e84eaa5791c9d84b25ec53eae267885e45c8fb0a052
                                                                                  • Opcode Fuzzy Hash: 881e86d389d9cefced57cf04117e8820d9d165fbcb2647cbb323e1f898b7160a
                                                                                  • Instruction Fuzzy Hash: 2231CE32305B4982EAA59B64E5903AD6390F78CBE0F089224EF6D57BD1CF69CA598700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value_time64
                                                                                  • String ID: MsgCenter$opentime_afterupdate
                                                                                  • API String ID: 785988768-2434204715
                                                                                  • Opcode ID: 5bb0f640ed1e05b6f5fb6319ad101f5784147dd22b425cd5bc3155a5095c0593
                                                                                  • Instruction ID: fc05a4dbc7e4eba58b3f0245281c2719f95df9f8cff95e83ed4d87eeecbf7a83
                                                                                  • Opcode Fuzzy Hash: 5bb0f640ed1e05b6f5fb6319ad101f5784147dd22b425cd5bc3155a5095c0593
                                                                                  • Instruction Fuzzy Hash: F021A272600B4887E752CF28D4407897BA0F788BF4F508325BA69537E4DF34C649CB41
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ??2@_wcslwrmemset
                                                                                  • String ID: Global\QIHOO360_%s
                                                                                  • API String ID: 2483156104-3710684550
                                                                                  • Opcode ID: 9be342a6d8c237716bffd5caf06391c6b8b6f70f0f13e01ce8d5a989816153c8
                                                                                  • Instruction ID: 82c5ad46f6e7f4dabe07948ff870f9b922604b6aade2c66f9895ca3b1b8f50de
                                                                                  • Opcode Fuzzy Hash: 9be342a6d8c237716bffd5caf06391c6b8b6f70f0f13e01ce8d5a989816153c8
                                                                                  • Instruction Fuzzy Hash: 5821A171205B8881FBA6DB10E8553EA6360F7897D4F808221B69D077D5EF3DCA49C745
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • sscanf.LEGACY_STDIO_DEFINITIONS ref: 000000018006A519
                                                                                  • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,0000000180069AA1), ref: 000000018006A530
                                                                                  • LocalFileTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,0000000180069AA1), ref: 000000018006A542
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Time$File$LocalSystemsscanf
                                                                                  • String ID: %hu-%hu-%hu %hu:%hu:%hu
                                                                                  • API String ID: 34346384-1004895946
                                                                                  • Opcode ID: d723607966dc0ff236e85823f2716610310f4f89feb8e52b597ed1c2c8f9df5e
                                                                                  • Instruction ID: 56cd0a7082cee1cdafaeaa7a6634e2a063740646281a87663471f261b7941616
                                                                                  • Opcode Fuzzy Hash: d723607966dc0ff236e85823f2716610310f4f89feb8e52b597ed1c2c8f9df5e
                                                                                  • Instruction Fuzzy Hash: 53210472B10B1889FB81DFA4D8803DD33B4B708788F948526EA1D96768EF34C659C750
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Resource$FreeLibraryLoad$FindFolderLockPathQuerySizeofSpecialValuefreemallocmemmovememset
                                                                                  • String ID: %u.%u.%u$\Internet Explorer\IEXPLORE.EXE
                                                                                  • API String ID: 28297470-3177478685
                                                                                  • Opcode ID: 24d6d362a50ceef5c55e60ddcc5b0fe3f6e297d637c40a6a892b7a9edbf356b3
                                                                                  • Instruction ID: 8c267d1c97a4f3ae60188c217bf77148b2efdc3265efdf379ec177d08f4db65c
                                                                                  • Opcode Fuzzy Hash: 24d6d362a50ceef5c55e60ddcc5b0fe3f6e297d637c40a6a892b7a9edbf356b3
                                                                                  • Instruction Fuzzy Hash: 95118F32325A8986EB91DB25E4457DB7360F78C789F805012B68A47955DF3DC609CF00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: FilePath$AppendCriticalExistsInitializeModuleNameSection
                                                                                  • String ID: ..\360NetBase64.dll
                                                                                  • API String ID: 2373086246-4183035884
                                                                                  • Opcode ID: d761a6c3e6a00880f8900059568cee75d214a1108ffb73bc445c6367f4a0409a
                                                                                  • Instruction ID: af5cf4f44f90b4c64e773468feb6851d22c47134ddc293a853e7e5ebda926cde
                                                                                  • Opcode Fuzzy Hash: d761a6c3e6a00880f8900059568cee75d214a1108ffb73bc445c6367f4a0409a
                                                                                  • Instruction Fuzzy Hash: 25114C71614A4981FBF3AB60E8953DB23A0FB8D7C9F518115B58D825A5EF28C74DC702
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: wcsncmp$DirectoryPath
                                                                                  • String ID: \\?\
                                                                                  • API String ID: 911398208-4282027825
                                                                                  • Opcode ID: eba105415aec120dfe2fa9ea8ee759a3358e54afb6881a7277e4926ce0db569d
                                                                                  • Instruction ID: 9903006c7179f3997e6314bb7e882962eeb1ce79a0b7cc9db4c5bfd4c7dd6eaa
                                                                                  • Opcode Fuzzy Hash: eba105415aec120dfe2fa9ea8ee759a3358e54afb6881a7277e4926ce0db569d
                                                                                  • Instruction Fuzzy Hash: E501AD3036568882FBA2EB25EC457E97214BB4CBD0F848235B96A8B1E5DF6CC34DC304
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalFilePathSection$AppendEnterExistsLeaveModuleNamememset
                                                                                  • String ID: ..\safemon\FreeSaaS.tpi
                                                                                  • API String ID: 154803636-205188023
                                                                                  • Opcode ID: 5dcafe1727c8202c4fade54654e340c0afccdd89b962ceed78f6299e177fdd45
                                                                                  • Instruction ID: d74fc56e569283819db6817bdf86699dd223bda9e6afadc26b68049d38556e4d
                                                                                  • Opcode Fuzzy Hash: 5dcafe1727c8202c4fade54654e340c0afccdd89b962ceed78f6299e177fdd45
                                                                                  • Instruction Fuzzy Hash: B5016D35219A8C82FBE2D721EC693D92790B78D388F80D041A4AA077A1DF2DC30DCB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32 ref: 0000000180056109
                                                                                  • CreateMutexW.KERNEL32(?,?,?,?,?,?,00000000,000000018000BCF5,?,?,?,?,?,0000000180006143), ref: 000000018005611D
                                                                                  • LocalFree.KERNEL32(?,?,?,?,?,?,00000000,000000018000BCF5,?,?,?,?,?,0000000180006143), ref: 000000018005612B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: DescriptorSecurity$ConvertCreateFreeLocalMutexString
                                                                                  • String ID: D:P(OA;;FA;;;WD)
                                                                                  • API String ID: 794372803-936388898
                                                                                  • Opcode ID: 8eafacdefded48d18c198f43637dcf9209a60b0ec07301bfb3a11cb5b2937e32
                                                                                  • Instruction ID: 0d5b46b33c23d90729eae48064ade5dfd8da35591b75e80b0d34519ac450dbba
                                                                                  • Opcode Fuzzy Hash: 8eafacdefded48d18c198f43637dcf9209a60b0ec07301bfb3a11cb5b2937e32
                                                                                  • Instruction Fuzzy Hash: 44014B72A14F4486EB518F21F8487A973E0F78CBD4F468221EA5D87714DF38C658C744
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                    • Part of subcall function 000000018000A7AC: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000180001020), ref: 000000018000A7D5
                                                                                  • _wcsicmp.MSVCRT ref: 000000018002AE4E
                                                                                    • Part of subcall function 00000001800275E4: IIDFromString.OLE32 ref: 000000018002760B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: FromHeapProcessString_wcsicmp
                                                                                  • String ID: $CLSID$ftp:
                                                                                  • API String ID: 2012545421-381575252
                                                                                  • Opcode ID: 248410c0f50f664e6cc0f1b348e136da499af2e3908b9f8e498f8b2d610c306c
                                                                                  • Instruction ID: d299122ce3e9d517528ccb327dc5a756d1d769515d838a72f3e491c2ced193a8
                                                                                  • Opcode Fuzzy Hash: 248410c0f50f664e6cc0f1b348e136da499af2e3908b9f8e498f8b2d610c306c
                                                                                  • Instruction Fuzzy Hash: 41F14073301B4886EB52DB29D8407DE7361F789BE9F448311AA6D876E5DF78CA49C700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$EnterInitializeLeavefreemallocmemmove
                                                                                  • String ID:
                                                                                  • API String ID: 1740668140-0
                                                                                  • Opcode ID: 22bd5bec54ccc0147c543859d5de4a8772452d611ad636121f4766ad3a15c823
                                                                                  • Instruction ID: e94a3ea1fea36b0b32ca35adaff13378f84fa0a728ffd439e1abdc7c1a055df0
                                                                                  • Opcode Fuzzy Hash: 22bd5bec54ccc0147c543859d5de4a8772452d611ad636121f4766ad3a15c823
                                                                                  • Instruction Fuzzy Hash: 4D316C32605B4886EB828F15EC543D977A5F79CBE4F59C225EAA9077A5CF3CC249C700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcsicmp
                                                                                  • String ID: ScriptEngine$ScriptHostEncode${0CF774D0-F077-11D1-B1BC-00C04F86C324}
                                                                                  • API String ID: 2081463915-2936173157
                                                                                  • Opcode ID: 91efc328dbdbb67abd3faf589063878782725af3816d995bc94ee69e6f4a6945
                                                                                  • Instruction ID: 292b1ab8c79ee979d74f734f58635ebd7dc6439912a4449b937fba72fcba6d7c
                                                                                  • Opcode Fuzzy Hash: 91efc328dbdbb67abd3faf589063878782725af3816d995bc94ee69e6f4a6945
                                                                                  • Instruction Fuzzy Hash: 5B514F72711E4986EB419F79C8807CC2760FB49BF4F449322AA3E936E5DF64C989C340
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$EnterInitializeLeave
                                                                                  • String ID:
                                                                                  • API String ID: 3991485460-0
                                                                                  • Opcode ID: 679129d8c6ac973d941e645a86577fd2f61a9db60b9c7d755c606238edf6303c
                                                                                  • Instruction ID: ad71276d619936af7ac4a5a15bbb21467ea728ff9fc93a66917b9291cac940fe
                                                                                  • Opcode Fuzzy Hash: 679129d8c6ac973d941e645a86577fd2f61a9db60b9c7d755c606238edf6303c
                                                                                  • Instruction Fuzzy Hash: 04514B36201B4886EB96CF21E844B9E33A9FB48BD8F158516EE6947768CF34C658C391
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: String$??2@Free$??3@Alloc
                                                                                  • String ID:
                                                                                  • API String ID: 1832687772-0
                                                                                  • Opcode ID: ec64ef81cce12dd9496e54433e59b2b444f0d078a8dee198f6ac45ada33b9a8a
                                                                                  • Instruction ID: 427e473512a75300f47d7fa230ba5ccb5e5a60885440308665830fb44559812f
                                                                                  • Opcode Fuzzy Hash: ec64ef81cce12dd9496e54433e59b2b444f0d078a8dee198f6ac45ada33b9a8a
                                                                                  • Instruction Fuzzy Hash: 58513A72711A0885EB91DFA5C8947ED3370FB48FE9F098621EE2A57698DF78C648C344
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: _errno$freewcstol
                                                                                  • String ID:
                                                                                  • API String ID: 1017142431-0
                                                                                  • Opcode ID: 9f264acde1fee37a4af08923b04b71ab41a6f4bc8a876f6580f083589344777c
                                                                                  • Instruction ID: ea2c5121f7eb01e98f314e31e7cc383447851c7166ff6db358424aa6cc9ed06f
                                                                                  • Opcode Fuzzy Hash: 9f264acde1fee37a4af08923b04b71ab41a6f4bc8a876f6580f083589344777c
                                                                                  • Instruction Fuzzy Hash: C351683264478886EBA68F26A1403AE33E5F7597D8F008115FF9907798CF3ADA59CB00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: _errno$freewcstol
                                                                                  • String ID:
                                                                                  • API String ID: 1017142431-0
                                                                                  • Opcode ID: c26116d00bfa255a5e71194d5ccf5fda896b8abf688f47e901cb44eb358fcc84
                                                                                  • Instruction ID: b35714efefb3a3022de44867f37344a12698415f3c6fa059f944579b3902dd1a
                                                                                  • Opcode Fuzzy Hash: c26116d00bfa255a5e71194d5ccf5fda896b8abf688f47e901cb44eb358fcc84
                                                                                  • Instruction Fuzzy Hash: AE415A7264478886EBB68F2594503EE37A1F7597E8F008115FF5807798CF3EDA5A8B00
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$ErrorLast
                                                                                  • String ID:
                                                                                  • API String ID: 1717984340-0
                                                                                  • Opcode ID: ac5000abb9ee01d321f1ec273ada81a5511227e924beba0eb19fad604af8d780
                                                                                  • Instruction ID: bae3b3959ef39ef5daeeababb2c60870945ab1ace41e6c98233782fb8fc2ea52
                                                                                  • Opcode Fuzzy Hash: ac5000abb9ee01d321f1ec273ada81a5511227e924beba0eb19fad604af8d780
                                                                                  • Instruction Fuzzy Hash: 9B31D272604B8482E764CF56B88074AB7A8F79DBD0F548628AFD947BA5CF38C645C700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseControlCreateDeviceErrorFileHandleLastmallocmemmovememset
                                                                                  • String ID: DISKID:$\\.\PhysicalDrive%d
                                                                                  • API String ID: 1541746987-3765948602
                                                                                  • Opcode ID: 0a0cd503669e2d71dfc94f1a05760105f70003c8e3e1ab21ca38997401335250
                                                                                  • Instruction ID: 026b1f04e6263926176f9cf333c98f43658e4a5f02bea82afa83b16206533a48
                                                                                  • Opcode Fuzzy Hash: 0a0cd503669e2d71dfc94f1a05760105f70003c8e3e1ab21ca38997401335250
                                                                                  • Instruction Fuzzy Hash: D831063220474542FBA29B66AC00BEA7392F789BD4F608121BE5947795DF3CC749CB40
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Delete
                                                                                  • String ID:
                                                                                  • API String ID: 1035893169-0
                                                                                  • Opcode ID: 22d0e1e140aac874fdce29ddc6509984b94616c0dddbf9d09c1d0fd8dd23a40b
                                                                                  • Instruction ID: 40b5deca117a7cefaab46096add2d716b918ff16b730c8479b301d173d09ace7
                                                                                  • Opcode Fuzzy Hash: 22d0e1e140aac874fdce29ddc6509984b94616c0dddbf9d09c1d0fd8dd23a40b
                                                                                  • Instruction Fuzzy Hash: 44219031705E8840FBAADBA2991079D6299BB4EFC0F1DC525FD2A437D4DE38C7488311
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: String$??3@Free$??2@AllocFileFindNamePath
                                                                                  • String ID:
                                                                                  • API String ID: 772211780-0
                                                                                  • Opcode ID: 0f2a8a44e8f4c9cff1795b6050ee267adc792dc9736a48368970f0735874c93d
                                                                                  • Instruction ID: 2d82027f7e94cb9bcb22be17a4537bea80464cdcc919518384ddf93808e552b3
                                                                                  • Opcode Fuzzy Hash: 0f2a8a44e8f4c9cff1795b6050ee267adc792dc9736a48368970f0735874c93d
                                                                                  • Instruction Fuzzy Hash: 0521C432611E4482EB529F29D85039EB3A0FB89BF4F198711EA794B6E8DF7CC2448700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: String$??3@Free$??2@AllocFileFindNamePath
                                                                                  • String ID:
                                                                                  • API String ID: 772211780-0
                                                                                  • Opcode ID: f9574987d235c529e2b4a5f79013c743acc608ea97a4ad6ac219f98d4fdede78
                                                                                  • Instruction ID: 283ffb4ef057f0283fd59c714cbfe65b47d72467c2882de283dc062303e29699
                                                                                  • Opcode Fuzzy Hash: f9574987d235c529e2b4a5f79013c743acc608ea97a4ad6ac219f98d4fdede78
                                                                                  • Instruction Fuzzy Hash: 1221B832611A4482EB92DF29D84439EB3A0FB89BF4F198725E779476E9DF7CC6448700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: String$??3@Free$??2@AllocFileFindNamePath
                                                                                  • String ID:
                                                                                  • API String ID: 772211780-0
                                                                                  • Opcode ID: 307ce0f3569f6860fa341fe80190f4157af3b04d29387ea8d5fe3f277a62001a
                                                                                  • Instruction ID: d9e03fda3b1d153f0bd4bb02b331d59468f410aa3c35072f5ffbfd31d5bd1a6e
                                                                                  • Opcode Fuzzy Hash: 307ce0f3569f6860fa341fe80190f4157af3b04d29387ea8d5fe3f277a62001a
                                                                                  • Instruction Fuzzy Hash: CD21D632601A4482EB568F29D89139EB3A0FB88BF4F198715EA79476E8DF7CC644C700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CountTick$freemalloc
                                                                                  • String ID:
                                                                                  • API String ID: 112427268-0
                                                                                  • Opcode ID: 40d9beaaacbcde50260c436ec66f3643f495edb07ad5aab697476aac6434d7f6
                                                                                  • Instruction ID: b8918b2958dc72fb2df8bfc42f6eb5cd02d312beeb31fdbe44136919b98f9138
                                                                                  • Opcode Fuzzy Hash: 40d9beaaacbcde50260c436ec66f3643f495edb07ad5aab697476aac6434d7f6
                                                                                  • Instruction Fuzzy Hash: 3021517261560987EFD78B24EC85BAF23A0B74C7C0F42E024F95682695DF38D75D8B02
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$Initialize$DeleteEnterLeave
                                                                                  • String ID:
                                                                                  • API String ID: 3345835275-0
                                                                                  • Opcode ID: 342e2fd84596a913fc4e554fed418576577eb4ed1e3f0298ebe73fa484c4289a
                                                                                  • Instruction ID: bac7ba2d50b8a8327d60b40396a6a413962eafb144c30abffe047fc5a4d1e144
                                                                                  • Opcode Fuzzy Hash: 342e2fd84596a913fc4e554fed418576577eb4ed1e3f0298ebe73fa484c4289a
                                                                                  • Instruction Fuzzy Hash: 51212970605A4896FBD29F50EC543D873A8F74EBE4F588229EAA9062A5DF39C74DC700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: _errno_msizememsetrealloc
                                                                                  • String ID:
                                                                                  • API String ID: 1716158884-0
                                                                                  • Opcode ID: cdc86eb51b19dd29fbdd1dbcc9e2dd10d7135d8ad8bd6beb6c08774733d5e7b7
                                                                                  • Instruction ID: eee6de8c671426a850027d5845b58404d35e5bb09185fe1037511193ebe898ed
                                                                                  • Opcode Fuzzy Hash: cdc86eb51b19dd29fbdd1dbcc9e2dd10d7135d8ad8bd6beb6c08774733d5e7b7
                                                                                  • Instruction Fuzzy Hash: 7201A536715648C1F9869B27A4043D99251AB8CBE0F1DD720BF6A07BCBDE3DC6418700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: _errno$memmovememset
                                                                                  • String ID:
                                                                                  • API String ID: 390474681-0
                                                                                  • Opcode ID: 34773165fa903b58a8169a26407c6ce6a53d95ed58fc80f98c13fe875aa60091
                                                                                  • Instruction ID: 14b1c1fe1981e25254dae316b1258392d266da5cf9c387dbe4ce1a9d85b7c1af
                                                                                  • Opcode Fuzzy Hash: 34773165fa903b58a8169a26407c6ce6a53d95ed58fc80f98c13fe875aa60091
                                                                                  • Instruction Fuzzy Hash: 2401D631B1469C42FAE66B56F0003EE5250AB8CBD0F48D020BF4557B8FCE2ECA968740
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$DeleteEnterFreeLeaveLibrary
                                                                                  • String ID:
                                                                                  • API String ID: 2347899730-0
                                                                                  • Opcode ID: 8ca6170e5c17e41b4a506002b7f4800d109eeedd4070b7d9029d326942e7e76d
                                                                                  • Instruction ID: 48e8189d87aa0b979fc36c7d6fe6748a55851d8ea4777fada0444d8c8a940578
                                                                                  • Opcode Fuzzy Hash: 8ca6170e5c17e41b4a506002b7f4800d109eeedd4070b7d9029d326942e7e76d
                                                                                  • Instruction Fuzzy Hash: 6E117033605B4897EB558F21E9443A97360FB4A7B5F1897249B690BAA0CF78D2798300
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: File_swprintf_c_l$PointerRead
                                                                                  • String ID:
                                                                                  • API String ID: 1259558433-0
                                                                                  • Opcode ID: 430f8c9727729296bcb3ae13e9e40dcee6c79fd9ad2c75f57ecad12c2e0545ef
                                                                                  • Instruction ID: 41788915f12d7117270c0c242483de8f49aba279d1603b6e07884f1d05f749b7
                                                                                  • Opcode Fuzzy Hash: 430f8c9727729296bcb3ae13e9e40dcee6c79fd9ad2c75f57ecad12c2e0545ef
                                                                                  • Instruction Fuzzy Hash: 9B01F53172864881F7929B61AC407DBA3A1F74D7C4F65C022FA5543A64CF3DC748CB20
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: memmove
                                                                                  • String ID:
                                                                                  • API String ID: 2162964266-0
                                                                                  • Opcode ID: f48e30d42f7362a3489efc8b4fb4b1d86e67ce5bf115bf63e3aa4bcefc4ad982
                                                                                  • Instruction ID: 461c31f9552aa3729a5e6565f135de1ccc8cc925f396947b96927f6322aea50e
                                                                                  • Opcode Fuzzy Hash: f48e30d42f7362a3489efc8b4fb4b1d86e67ce5bf115bf63e3aa4bcefc4ad982
                                                                                  • Instruction Fuzzy Hash: A6014B72604B8486DA999F02B84439AA6A4F799FC0F58C034AF9A1BB1ACE7CC2518700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: wcsncmp$FromListPath
                                                                                  • String ID: http://$https://
                                                                                  • API String ID: 1354619976-1916535328
                                                                                  • Opcode ID: f0180345e040584d079c5b24169db75a70be302b2ca9e14ca998ae6b14b2d4e5
                                                                                  • Instruction ID: 3b4f654c0190b1c660da69d9b707c9435e3e8476667423005c0f2b5f6a7ba28a
                                                                                  • Opcode Fuzzy Hash: f0180345e040584d079c5b24169db75a70be302b2ca9e14ca998ae6b14b2d4e5
                                                                                  • Instruction Fuzzy Hash: 21F06D30314B4D81FBD3AB22ED807E92361A74DBC0F08D026BE128B681EE29C79DC701
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • WideCharToMultiByte.KERNEL32 ref: 0000000180042D94
                                                                                    • Part of subcall function 000000018001AD68: InitializeCriticalSection.KERNEL32(?,?,?,?,?,000000018001AFD5), ref: 000000018001ADCE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharCriticalInitializeMultiSectionWide
                                                                                  • String ID: Cache-Control: no-cache$Connection: Keep-Alive
                                                                                  • API String ID: 2071930665-2797312137
                                                                                  • Opcode ID: 390d372ab0f8ca9c8d35a5c5b59fa4f1daf8a60d35f223fc70caf0e07e2a75eb
                                                                                  • Instruction ID: 06b1c2be51b69464b9694ee66dce0eee22d8a6c444c0793ba53430c965e4d999
                                                                                  • Opcode Fuzzy Hash: 390d372ab0f8ca9c8d35a5c5b59fa4f1daf8a60d35f223fc70caf0e07e2a75eb
                                                                                  • Instruction Fuzzy Hash: 6971B172300E9886EB96DF26D4807DD3760FB89BD8F86C625BE2947B85CF31D6598304
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Xinvalid_argumentstd::_
                                                                                  • String ID: map/set<T> too long
                                                                                  • API String ID: 909987262-1285458680
                                                                                  • Opcode ID: 4f8b5c4a4b7dfd174ba02e61296e3cf7ea921cc7912cdcef76d88542124505ce
                                                                                  • Instruction ID: b716ba77de4695a230c5cde56cb36caf30baef682964767987e615475274616d
                                                                                  • Opcode Fuzzy Hash: 4f8b5c4a4b7dfd174ba02e61296e3cf7ea921cc7912cdcef76d88542124505ce
                                                                                  • Instruction Fuzzy Hash: 17419E32208F8881EAA2CF25E84039E73A4F399BE0F558225EF9D43B95DF39C556C740
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFindNamePathwcscmp
                                                                                  • String ID: RUNDLL32
                                                                                  • API String ID: 3222201028-252960710
                                                                                  • Opcode ID: cb23065da29cb40e9b09dc38cb932cba9fa4c45224ed154b04bc2c1aad3b4612
                                                                                  • Instruction ID: 4f5a5794d41fc096d520f70cd288b3f3e4e93d0d03317b7f7fc332b0f1d573f2
                                                                                  • Opcode Fuzzy Hash: cb23065da29cb40e9b09dc38cb932cba9fa4c45224ed154b04bc2c1aad3b4612
                                                                                  • Instruction Fuzzy Hash: 87412932711A5896EB919F39C84479C2360FB49BB8F548312EA3D47BE9DF34CA99C344
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • ShellExecuteW.SHELL32 ref: 000000018004AF73
                                                                                    • Part of subcall function 00000001800495A4: GetTickCount.KERNEL32 ref: 00000001800495AC
                                                                                    • Part of subcall function 00000001800495A4: srand.MSVCRT ref: 00000001800495B4
                                                                                    • Part of subcall function 00000001800495A4: GetCurrentProcessId.KERNEL32 ref: 00000001800495BA
                                                                                    • Part of subcall function 00000001800495A4: GetCurrentProcessId.KERNEL32 ref: 00000001800495CE
                                                                                    • Part of subcall function 00000001800495A4: ??_U@YAPEAX_K@Z.MSVCRT ref: 00000001800495FA
                                                                                    • Part of subcall function 00000001800495A4: GetTokenInformation.ADVAPI32 ref: 0000000180049629
                                                                                    • Part of subcall function 00000001800495A4: GetSidSubAuthorityCount.ADVAPI32 ref: 0000000180049636
                                                                                    • Part of subcall function 00000001800495A4: GetLastError.KERNEL32 ref: 000000018004963F
                                                                                    • Part of subcall function 00000001800495A4: GetSidSubAuthority.ADVAPI32 ref: 0000000180049658
                                                                                    • Part of subcall function 00000001800495A4: ??_V@YAXPEAX@Z.MSVCRT ref: 000000018004967B
                                                                                    • Part of subcall function 00000001800494C4: ??_U@YAPEAX_K@Z.MSVCRT ref: 00000001800494DA
                                                                                  • memset.MSVCRT ref: 000000018004AF8E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AuthorityCountCurrentProcess$ErrorExecuteInformationLastShellTickTokenmemsetsrand
                                                                                  • String ID: p
                                                                                  • API String ID: 526592482-2181537457
                                                                                  • Opcode ID: db20606bd2f8c5ddcc62ab015699e8350b9eea6392e973e239eb88e586f6bc5b
                                                                                  • Instruction ID: c7a46caf8343ac9de693e6305f929c410170157657da93c1511d6525c5ccc842
                                                                                  • Opcode Fuzzy Hash: db20606bd2f8c5ddcc62ab015699e8350b9eea6392e973e239eb88e586f6bc5b
                                                                                  • Instruction Fuzzy Hash: B221B632208F8885E7A1DF51F48078AB3A4F799BC4F158021BE8D43B59DF38C549CB44
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • ShellExecuteW.SHELL32 ref: 000000018004B0BF
                                                                                    • Part of subcall function 00000001800495A4: GetTickCount.KERNEL32 ref: 00000001800495AC
                                                                                    • Part of subcall function 00000001800495A4: srand.MSVCRT ref: 00000001800495B4
                                                                                    • Part of subcall function 00000001800495A4: GetCurrentProcessId.KERNEL32 ref: 00000001800495BA
                                                                                    • Part of subcall function 00000001800495A4: GetCurrentProcessId.KERNEL32 ref: 00000001800495CE
                                                                                    • Part of subcall function 00000001800495A4: ??_U@YAPEAX_K@Z.MSVCRT ref: 00000001800495FA
                                                                                    • Part of subcall function 00000001800495A4: GetTokenInformation.ADVAPI32 ref: 0000000180049629
                                                                                    • Part of subcall function 00000001800495A4: GetSidSubAuthorityCount.ADVAPI32 ref: 0000000180049636
                                                                                    • Part of subcall function 00000001800495A4: GetLastError.KERNEL32 ref: 000000018004963F
                                                                                    • Part of subcall function 00000001800495A4: GetSidSubAuthority.ADVAPI32 ref: 0000000180049658
                                                                                    • Part of subcall function 00000001800495A4: ??_V@YAXPEAX@Z.MSVCRT ref: 000000018004967B
                                                                                    • Part of subcall function 00000001800494C4: ??_U@YAPEAX_K@Z.MSVCRT ref: 00000001800494DA
                                                                                  • memset.MSVCRT ref: 000000018004B0DA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: AuthorityCountCurrentProcess$ErrorExecuteInformationLastShellTickTokenmemsetsrand
                                                                                  • String ID: p
                                                                                  • API String ID: 526592482-2181537457
                                                                                  • Opcode ID: f2d62255b16ca96ed2cbf9c0141287d8586ff51f1b7a2213e7ec1c807b59ad21
                                                                                  • Instruction ID: 630a19f9e7c8d33164371876bc9408f173fd4fcd3dffaf0243fab21a92527801
                                                                                  • Opcode Fuzzy Hash: f2d62255b16ca96ed2cbf9c0141287d8586ff51f1b7a2213e7ec1c807b59ad21
                                                                                  • Instruction Fuzzy Hash: E1217432204F8885E7A1DF61F48078AB7A4F788BC4F558121FE8883B5ADF38C654CB44
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value
                                                                                  • String ID: MsgCenter$opentime_afterinstall
                                                                                  • API String ID: 3702945584-3718352646
                                                                                  • Opcode ID: bc51746a4845ef3513b79512763e58b7b7c59a9adac5c6c1a917732545d0aad2
                                                                                  • Instruction ID: 9121a4dbc030fef007b745f88a0fe18748c482634fd5ebee216f5006264a8ac8
                                                                                  • Opcode Fuzzy Hash: bc51746a4845ef3513b79512763e58b7b7c59a9adac5c6c1a917732545d0aad2
                                                                                  • Instruction Fuzzy Hash: AC116A72600B4482EB508F29E44438AB760F789BF4F108316EB79437E4CF79C688CB84
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • GetCurrentThreadId.KERNEL32(?,171.8.167.45,?,0000000180074FBF,?,?,?,?,?,?,000000018006F6BE), ref: 0000000180074CD8
                                                                                  • Sleep.KERNEL32(?,171.8.167.45,?,0000000180074FBF,?,?,?,?,?,?,000000018006F6BE), ref: 0000000180074CF4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentSleepThread
                                                                                  • String ID: 171.8.167.45
                                                                                  • API String ID: 1164918020-2723241389
                                                                                  • Opcode ID: b82daa9be066ead2ec14612a1a02b00537e7c47846788e1f0fd2d6a2c4d35c95
                                                                                  • Instruction ID: 739a1f1183ec9c18e579ba8ee55cb859ca32a6d953d7c9429809cc63265ca520
                                                                                  • Opcode Fuzzy Hash: b82daa9be066ead2ec14612a1a02b00537e7c47846788e1f0fd2d6a2c4d35c95
                                                                                  • Instruction Fuzzy Hash: B201D13370425586E7A3DFA9B88039E66A0F74C7E0F058431FF4487655EF79C99A8B80
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value
                                                                                  • String ID: MsgCenter$opentime_afterinstall
                                                                                  • API String ID: 3702945584-3718352646
                                                                                  • Opcode ID: 5bc7ba386a7905614b99b0fc8fa89d0a447947fd7441929353b8c1a08fc42a0a
                                                                                  • Instruction ID: 21b9b515d364e76d08f8b9de98a0e6c83aa7314f475d7e108810017b28aec3e9
                                                                                  • Opcode Fuzzy Hash: 5bc7ba386a7905614b99b0fc8fa89d0a447947fd7441929353b8c1a08fc42a0a
                                                                                  • Instruction Fuzzy Hash: DA0188B2611B4482DB10DF69D854389B760F788BB0F00831AEA79137E4DF78C699CB44
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000008.00000002.446994309.0000000180001000.00000020.00000001.01000000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                  • Associated: 00000008.00000002.446990685.0000000180000000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447008267.0000000180086000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447016292.00000001800C5000.00000008.00000001.01000000.00000000.sdmpDownload File
                                                                                  • Associated: 00000008.00000002.447024270.000000018016C000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_8_2_180000000_rundll32.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionThrow
                                                                                  • String ID:
                                                                                  • API String ID: 432778473-0
                                                                                  • Opcode ID: 114c5287cdb026fffe76d3c7f9949e070cfa45e7e663d84f565ee682834d51f6
                                                                                  • Instruction ID: 38ed7ffc1fc9f375285380fd3d7b3dc2d70f7ac5fc31fc0dcffbf51ad022335a
                                                                                  • Opcode Fuzzy Hash: 114c5287cdb026fffe76d3c7f9949e070cfa45e7e663d84f565ee682834d51f6
                                                                                  • Instruction Fuzzy Hash: 9D0184B1650A88C9E79DFF33A8063FB6212BBD87C0F18C835B9954B65BDE25C21A4700
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%